CID proxy could a mod confirm this?

03/08/2008 13:37 bladiaxe#1
Has CID proxy been checked for backdoors and hidden commands and its coding checked through properly? :)
03/08/2008 14:42 Hiyoal#2
Yes it has, there has been discussion on this topic in Level 2.

Being a member, I can confirm that it is safe :D

Hiyoal
03/08/2008 16:55 IAmHawtness#3
Quote:
Originally Posted by hiyoal View Post
Yes it has, there has been discussion on this topic in Level 2.

Being a member, I can confirm that it is safe :D

Hiyoal
I always thought it was supposed to be un-decompileable .. Or, whatever you call it, so you couldn't check the source code? :confused:
03/08/2008 17:16 Stink.Fly#4
Quote:
Originally Posted by IAmHawtness View Post
I always thought it was supposed to be un-decompileable .. Or, whatever you call it, so you couldn't check the source code? :confused:
You think epvp would let its members download a proxy which hasnt been checked? :confused:
03/08/2008 17:32 Huseby#5
Quote:
Originally Posted by Stink.Fly View Post
You think epvp would let its members download a proxy which hasnt been checked? :confused:
O ye they wude, happend to many times.
03/08/2008 22:29 Hiyoal#6
Its been checked and its clean, lets not get on the discussion of previous proxies :p

Hiyoal
03/08/2008 22:43 bone-you#7
Quote:
Originally Posted by hiyoal View Post
Its been checked and its clean, lets not get on the discussion of previous proxies :p

Hiyoal
Where was it checked?
03/08/2008 23:32 hok30#8
Quote:
Originally Posted by hiyoal View Post
Yes it has, there has been discussion on this topic in Level 2.

Being a member, I can confirm that it is safe :D

Hiyoal
Please read the whole post before posting comments! JK! :D
03/09/2008 00:06 bone-you#9
I've never seen it checked and given the history have some issues with it myself :P feel free to use it, but unless shown otherwise, I would have to say it has not been checked. The discussion in level 2 ended up talking about older proxies so it did not end in us knowing whether it was clean or not.
03/09/2008 02:05 Stink.Fly#10
Quote:
Originally Posted by bone-you View Post
I've never seen it checked and given the history have some issues with it myself :P feel free to use it, but unless shown otherwise, I would have to say it has not been checked. The discussion in level 2 ended up talking about older proxies so it did not end in us knowing whether it was clean or not.
Maybe you should bring back the point to other mods/lvl 2 members then? Im sure everyone would like some peace of mind regarding this. Nice tool but its a shame about past proxy history.
03/09/2008 03:44 bone-you#11
Since it, like all other malicious proxies, is coded in java, the best way to verify would be a peek at the source. Highly unlikely that would happen though.
03/09/2008 05:26 L3r0y~J3nk1n$#12
Quote:
Originally Posted by hiyoal View Post
Its been checked and its clean, lets not get on the discussion of previous proxies :p

Hiyoal
Quote:
Originally Posted by bone-you View Post
Where was it checked?
If it were checked and found to be clean, then when you report that you should also mention the build/version and give the md5 checksum for it. We all know those guys are sneaky.
03/09/2008 08:42 iliveoncaff2#13
We sure are.
Also, Hiyoal, could you drop me a PM with what was used to decompile it? I'm interested into how it was done lol

I've got a few questions on your methods of checking as well >.>
03/09/2008 10:18 ojojoj#14
is there a progy ( packet sniffer?) that can check if im safe and my acc pass rnt beein sent to someone else tru proxy??
03/09/2008 11:57 Some-Guy#15
Quote:
Originally Posted by ojojoj View Post
is there a progy ( packet sniffer?) that can check if im safe and my acc pass rnt beein sent to someone else tru proxy??
CO packets aren't plain text, so the way (if any, I'm not saying it's dirty) would be to send a chat packet through conquer to a character who was always logged in and block the reply packet (blah blah is offline etc) if the account is offline for some reason. Meaning unless you are able to decrypt co packets, keeping the counters correctly stored for use decrypting, which are based around the size of packets sent/received then you'd be out of luck.