Conquer Aimbot

11/10/2005 13:24 Ultimation#1
well, as you all know the Co 1.0 is on its last week as tq release co 2.0

so i will release my aimbot for this last week :)

A few rules.

1.dun abuse or leach from this site
2.dun make noob characters and try and sell for dbs, i will kno
3. dun debug or edit the program in anyway

a few notices to players on Ruby

^Sakura^ - Yay u get it.
2h0t4y0u - yes u get it, now stop being an idiot, and a pathetic low life child

a notice to everyone else
Requires My Hack Manager
ENJOY!!!!!


Aimbot [Only registered and activated users can see links. Click Here To Register...] <--- Status: Online
11/10/2005 13:27 papariba#2
k thx :D

the site doesnt work yet lolz
11/10/2005 13:47 Ultimation#3
the link is now working
11/10/2005 14:04 killmeifyoucatch#4
how can we run it ??? help plsss
11/10/2005 17:11 mind...#5
ultimatehaker, could you whisper me your character name...would be cool to chit-chat with you a little...
11/10/2005 18:22 unknownone#6
Doesn't it work on Co2?

I just began making my own aimbot now I reversed the fb packets.
I can't see any difference in the packets on the Co2 client.
11/10/2005 19:12 thedevil666#7
i noticed your on ruby. hmmm, omega? or tiny?
11/10/2005 19:14 unknownone#8
Hmm, how the heck do I use the damn thing. I got it working for about 1 second, but its not workign now.
:/
11/10/2005 19:20 thedevil666#9
to bad i'm in school or else i'll try it
11/10/2005 19:27 Qonquer#10
If you all know how to modify the server.dat file, drop me a PM for a conquer proxy IP address which will be running my fastblade/scentsword aimbot in about an hour's time.

(ps. don't worry about me password stealing cos the passwords you login with are encrypted before they are transmitted, but tis upto you, you either trust me or you don't)

Reason for edit: Typos
11/10/2005 19:37 Sukh#11
Links dead...
11/10/2005 20:10 chocoman4k#12
Quote:
Originally posted by Qonquer@Nov 10 2005, 19:27
(ps. don't worry about me password stealing cos the passwords you login with are encrypted before they are transmitted, but tis upto you, you either trust me or you don't)
Both, the protocol and the password is being encrypted with a 2-way encryption algorithm which means it can be decrypted again.
11/10/2005 20:13 Sukh#13
link plz
11/10/2005 20:15 Qonquer#14
can you explain the password encryption reversal proceedure?

It is very common in a lot of systems to encrypt a password with a non-reversible hash before sending it. The same hash is applied to the password on file server-side to make the comparison. I haven't actually looked at the password too closely but i have had to implement it's usage as many here will know. You may be right and it may be reversible but I very much doubt it.

(just FYI, the protocol is encrypted and the password is encrypted further)
11/10/2005 20:38 chocoman4k#15
Quote:
Originally posted by Qonquer@Nov 10 2005, 20:15
can you explain the password encryption reversal proceedure?

It is very common in a lot of systems to encrypt a password with a non-reversible hash before sending it. The same hash is applied to the password on file server-side to make the comparison. I haven't actually looked at the password too closely but i have had to implement it's usage as many here will know. You may be right and it may be reversible but I very much doubt it.

(just FYI, the protocol is encrypted and the password is encrypted further)
Never tried to write a decryption algorithm, but as far as I remember it's byte-wise encryption which is reversible. Anyway the hash of the password is enough in order to login.