So, epvp didn't pass the test, (some guy really understood, it was a test for you, guys). But anyway, i'm releasing this because i just keep my promises.
Nothing in this archive is nor modified, nor edited, those are original server files i've leaked from vsro servers. Yes, those are official files, which are running on official servers. It's not any kind of emulator.
========server files====================
Part1 :
Multi:
[Only registered and activated users can see links. Click Here To Register...]
Deposit:
[Only registered and activated users can see links. Click Here To Register...]
Part2 :
Multi:
[Only registered and activated users can see links. Click Here To Register...]
Deposit:
[Only registered and activated users can see links. Click Here To Register...]
Part3 :
Multi:
[Only registered and activated users can see links. Click Here To Register...]
Deposit:
[Only registered and activated users can see links. Click Here To Register...]
More Uploads:
by 90d0fwar
========Database dumps================
Link :
[Only registered and activated users can see links. Click Here To Register...]
========Changeset obt 247 - 249==========
Link :
[Only registered and activated users can see links. Click Here To Register...]
========Xtrap update files===============
Link :
[Only registered and activated users can see links. Click Here To Register...]
=======Billing asp scripts=================
Link :
[Only registered and activated users can see links. Click Here To Register...]
=======Drew's custom cert===============
Link :
[Only registered and activated users can see links. Click Here To Register...] (you have to modify settings, try doing it on your own)
=======Latest SMC (update removed)=======
[Only registered and activated users can see links. Click Here To Register...]
TORRENT (3 blitzkrieq_bin_package parts):
[Only registered and activated users can see links. Click Here To Register...]
And some epic ff amv hhh
[Only registered and activated users can see links. Click Here To Register...]
Don't forget to turn off data execution prevention system before trying to launch any of server modules...
Almost forgot, the password is "fortheworstcommunityever".
Fun stuff :
Simple registration page (php)
index.php
Code:
<?php
/* Simple registration page for silkroad server, by Chernobyl
* Settings are at _inc/config.php
* If you get an mssql connection error, while defining totally correct data
* Just use older ntwdblib.dll for your webserver
*/
require_once('_inc/security.class.php');
require_once('_inc/config.php');
if(!isset($_POST['submit']))
{
echo "<table border='1'>
<form method='post'>
<td>Username</td><td><input type='text' name='username' maxlength='16'></td><tr/>
<td>Password[1]</td><td><input type='password' name='pw1' maxlength='32'></td><tr/>
<td>Password[2]</td><td><input type='password' name='pw2' maxlength='32'></td><tr/>
<td></td><td><input type='submit' name='submit' value='Register'></td>
</form>
</table>";
}
else
{
if(is_array($_POST['username'])) die("Username can't be array.");
if(is_array($_POST['pw1'])) die("Password [1] can't be array.");
if(is_array($_POST['pw2'])) die("Password [2] can't be array.");
if(strlen($_POST['username']) < 3) $msg[] = "Username too short";
if(strlen($_POST['username']) > 16)$msg[] = "Username too long";
if(strlen($_POST['pw1']) < 6) $msg[] = "Password [1] too short";
if(strlen($_POST['pw1']) > 32)$msg[] = "Password [1] too long";
if(strlen($_POST['pw2']) < 6) $msg[] = "Password [2] too short";
if(strlen($_POST['pw']) > 32) $msg[] = "Password [2] too long";
if($_POST['pw1'] != $_POST['pw2']) $msg[] = "Passwords are not the same";
$sec = new security();
if($sec->is_secure($_POST['username']) == false) $msg[] = "Username contains forbidden symbols";
if($sec->is_secure($_POST['pw1']) == false) $msg[] = "Password [1] contains forbidden symbols";
if($sec->is_secure($_POST['pw2']) == false) $msg[] = "Password [2] contains forbidden symbols";
if(count($msg) > 0)
{
for($i = 0; $i < count($msg); $i++)
{
echo $msg[$i]."<br/>";
}
return;
}
else
{
//checking damn mssql stuff
$accountExists = mssql_num_rows(mssql_query("select StrUserID from TB_User where StrUserID='$_POST[username]'"));
if($accountExists > 0) echo "Account with such username already exists<br/>";
else
{
$pwd = md5($_POST['pw1']);
mssql_query("insert into TB_User(StrUserID,password,sec_primary,sec_secondary) values('$_POST[username]','$pwd','3','3')");
echo "Account successfully created<br/>";
}
}
}
_inc/security.class.php
Code:
<?php
class security
{
function is_secure($string)
{
$pattern = "#[^a-zA-Z0-9_\-]#";
if(preg_match($pattern,$string)==true)return false;
else
return true;
}
}
?>
_inc/config.php
Code:
<?php
$cfg['sql_host'] = ".\SQLEXPRESS";
$cfg['sql_user'] = "sa";
$cfg['sql_pass'] = "1234";
$cfg['sql_db'] = "SRO_VT_ACCOUNT";
$sqlLink = mssql_connect($cfg[sql_host],$cfg[sql_user],$cfg[sql_pass]);
if(!$sqlLink) die("MSSQL server is not accessable, why should we try to select database ?");
else
{
mssql_select_db($cfg[sql_db],$sqlLink);
}
?>
More stuff comes a bit later :)
=================================================
And no, i'm not Chernobyl from rz :).