|
You last visited: Today at 09:32
Advertisement
[RELEASE] 5th job hack + Video tutorial on how to do the V3 bypasser
Discussion on [RELEASE] 5th job hack + Video tutorial on how to do the V3 bypasser within the Grand Chase Hacks, Bots, Cheats & Exploits forum part of the Grand Chase category.
04/26/2010, 10:45
|
#196
|
elite*gold: 0
Join Date: Oct 2009
Posts: 6
Received Thanks: 0
|
its mind cracking hack .... i cant make it work ...... w3w im thinking how to crack it .. xDD
|
|
|
04/26/2010, 10:45
|
#197
|
elite*gold: 0
Join Date: Sep 2009
Posts: 28
Received Thanks: 8
|
sir why is the link not found??
|
|
|
04/26/2010, 10:49
|
#198
|
elite*gold: 0
Join Date: Jun 2009
Posts: 39
Received Thanks: 0
|
what is the password becuase when u will decrypt it the program needs password
|
|
|
04/26/2010, 10:56
|
#199
|
elite*gold: 0
Join Date: Mar 2010
Posts: 223
Received Thanks: 24
|
ya your right !!
|
|
|
04/26/2010, 10:58
|
#200
|
elite*gold: 20
Join Date: May 2009
Posts: 601
Received Thanks: 18
|
its sir noein's 1st step to teach us to be a "pro-hacker"....
lets learn step by step...
someday,, we can manipulate this game...
|
|
|
04/26/2010, 11:02
|
#201
|
elite*gold: 0
Join Date: Apr 2009
Posts: 254
Received Thanks: 122
|
Quote:
Originally Posted by Alien2 View Post
Well I guess this is a way of sharing hacks between hackers that is very easy to do.
"Sharing hack between hackers" isn't everyone here trying to hack GC? OR do you mean pro hackers? If they're pro hackers why would they need to "release" it? can't they just PM each other?
And you prevent lechers from getting the file. I've never understand what "leecher" meant, but I'm guessing it's someone who takes the hack and re-release it and claim the credit? Ok yes, it'll prevent leecher, but it also prevented over 95% of people from using it
Also this limits the amount of people who can acquire this hack and the less people use it the longer the hack stays alive. Didn't the post starter said that this is a bypass that will bypass ANYTHING? So why will it get patched over?
Plain and simple...
|
You're so logical.
Well, you know them.
They just wanted to show to everyone they've never even met that they're good at hacking.
Seriously, I never even expect someone to release hacks.
|
|
|
04/26/2010, 11:04
|
#202
|
elite*gold: 0
Join Date: Nov 2008
Posts: 12
Received Thanks: 0
|
can't decrypt it, got password protected tsk3
|
|
|
04/26/2010, 11:18
|
#203
|
elite*gold: 0
Join Date: Mar 2010
Posts: 223
Received Thanks: 24
|
how to decrypt it ser plss teach me
|
|
|
04/26/2010, 11:23
|
#204
|
elite*gold: 0
Join Date: Dec 2009
Posts: 308
Received Thanks: 79
|
what program can we use to decrypt the 1st encryption, still stuck at noienshack.txt
|
|
|
04/26/2010, 11:38
|
#205
|
elite*gold: 0
Join Date: Jun 2009
Posts: 63
Received Thanks: 20
|
.NET Framework 4
Generating Keys for Encryption and Decryption
Creating and managing keys is an important part of the cryptographic process. Symmetric algorithms require the creation of a key and an initialization vector (IV) that must be kept secret from anyone who should not decrypt your data. Asymmetric algorithms require the creation of a public key and a private key. The public key can be made public to anyone, while the private key must known only by the party who will decrypt the data encrypted with the public key. This section describes how to generate and manage keys for both symmetric and asymmetric algorithms.
Symmetric Keys
The symmetric encryption classes supplied by the .NET Framework require a key and a new initialization vector (IV) to encrypt and decrypt data. Whenever you create a new instance of one of the managed symmetric cryptographic classes using the default constructor, a new key and IV are automatically created. Anyone that you allow to decrypt your data must possess the same key and IV and use the same algorithm. Generally, a new key and IV should be created for every session, and neither the key nor IV should be stored for use in a later session.
To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption. Sending these values across an insecure network without encrypting them is extremely unsafe, as anyone that intercepts these values can then decrypt your data. For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme.
The following example shows the creation of a new instance of the TripleDESCryptoServiceProvider class that implements the TripleDES algorithm.
xD
|
|
|
04/26/2010, 11:47
|
#206
|
elite*gold: 0
Join Date: Oct 2009
Posts: 8
Received Thanks: 0
|
Well, I think I just decoded the entire enchalada.
But, All I see are random capital letters and numbers.
Am I on the right track?
|
|
|
04/26/2010, 11:52
|
#207
|
elite*gold: 0
Join Date: Mar 2010
Posts: 66
Received Thanks: 8
|
i really cant understand anything or everything and nothing,.,.
(sigh) i wish i can understand it,. but its hard for me being just a kid who plays gcph using a sd hacks,. and then ,.., now,.,. i think no more hack for me,.
i think only very intelligent people can only use that hack,.,. people who knows a lot in programing ,.,. but for me,.,. maybe not only me,.,. who give up knowing nothing with this ultimate hack,.,.
im just a newbie in gcph,. then i discover this hack,.,.wow im happy to play with such less efforts in dungeons,.,.
hmmm,. maybe thats all i can say,.,.
by the way,.,. just ignore me,.,. all i can say is thanks a lot for sir noein for making hacks,.,. i understand his efforts ,.,. his efforts for helping us for free without waiting for anything in change ,.,. just to help us is his purpose,..,
but now,.,. waaaaaa,.,. i think i cant us him hacks anymore,. not only me,.,.
this is a goodbye for me using hacks,.,. i will know play normaly,. (its very hard >,<) but its ok,.,.thank you so much sir.noein,... i cant us any hacks anymore,.,.
>.<
|
|
|
04/26/2010, 11:59
|
#208
|
elite*gold: 0
Join Date: Oct 2009
Posts: 8
Received Thanks: 0
|
Quote:
Originally Posted by duran249
TRY TO USE YOUR EYES............YOU CAN SEE THE LINK BY USING YOUR EYES PROPERLY.....
|
Are you sure?
After all, I spent 3 years trying to solve the witch's epitaph, to no avail.
|
|
|
04/26/2010, 12:10
|
#209
|
elite*gold: 1
Join Date: Jan 2009
Posts: 2,964
Received Thanks: 375
|
still stucked with this Visual C# console app XD
static void DecryptFile(string sInputFilename,
string sOutputFilename,
string sKey)
{
DESCryptoServiceProvider DES = new DESCryptoServiceProvider();
//A 64 bit key and IV is required for this provider.
//Set secret key For DES algorithm.
DES.Key = ASCIIEncoding.ASCII.GetBytes(sKey);
//Set initialization vector.
DES.IV = ASCIIEncoding.ASCII.GetBytes(sKey);
//Create a file stream to read the encrypted file back.
FileStream fsread = new FileStream(sInputFilename,
FileMode.Open,
FileAccess.Read);
//Create a DES decryptor from the DES instance.
ICryptoTransform desdecrypt = DES.CreateDecryptor();
//Create crypto stream set to read and do a
//DES decryption transform on incoming bytes.
CryptoStream cryptostreamDecr = new CryptoStream(fsread,
desdecrypt,
CryptoStreamMode.Read);
//Print the contents of the decrypted file.
StreamWriter fsDecrypted = new StreamWriter(sOutputFilename);
fsDecrypted.Write(new StreamReader(cryptostreamDecr).ReadToEnd());
fsDecrypted.Flush();
fsDecrypted.Close();
}
|
|
|
04/26/2010, 13:03
|
#210
|
elite*gold: 0
Join Date: Jan 2010
Posts: 6
Received Thanks: 0
|
..cant u see the code??..Noein's ultimate release.. key to activate all the hacks..thats da code..hehe..
|
|
|
All times are GMT +1. The time now is 09:33.
|
|