Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Pride

Pages: 1 2 3 [4] 5 6 7 8 9 ... 20
Armed Assault 2 / Re: ARMA2: For free??
« on: June 10, 2011, 01:24:24 pm »
I think it's floating around on a few pc magazine cover discs atm.

Also, I think it uses a different EXE from normal vanilla arma 2, called ArmA2Free.exe or something like that.

CBF looking further at the differences if I already own ArmA 2 :P

Armed Assault 2 / Re: Trade? bi2 bypass for some keys :)
« on: June 09, 2011, 11:56:14 am »
Hi, I'll tell you what everybody knows and I'll let you pay me for it.

What? No takers?

General Modding & Programming / Other Games / Re: Cod 4 rcon hack?
« on: June 06, 2011, 05:42:40 am »
Aww, looks like someone got banned from their fave CoD 4 server. Heh.

No, there isn't. If there were, it would be highly unlikely for whoever has possession of it to hand it over to you :P

Armed Assault 2 / Re: warinc hack
« on: June 02, 2011, 09:58:51 am »
You forgot to show us who it's from!

Armed Assault 2 / Re: PBO packet analysis
« on: May 31, 2011, 09:05:57 am »
Well, it's probably just a deterrant from using dumb packet editing tools.

I suppose if you look at the server code as well you may see it checking. BI love their weird hashing schemes.

KANAL seems to think that 00C71BE0 is CRC32 related as well...

Hell, while you're at it, see if you can send commands to the scripting interface via injection.

Armed Assault 2 / Re: PBO packet analysis
« on: May 31, 2011, 08:36:32 am »
I haven't looked at ArmA in ages, but wasn't DWORD Unknownhash some sort of sequence counter because they were using UDP? (Which I don't think has a sequence counter built into the protocol like TCP) or was it something that was introduced with 1.59?

Armed Assault 2 / Re: bi2 sigs (help me :P)
« on: May 30, 2011, 08:08:40 am »
Use what you have learnt from bypassing the normal ones.

If you used a tool, you have learnt nothing and should be kicked for even trying.

Note that the hex-editing of disableuserinput is just one way of disabling it, so if you just happened to start checking the exe for changes, it could still be bypassed.

Too bad, Matt + Jones.

Just grab any hex editor and search and replace any references to disableUserInput to something of equal length.

Eg. disableUserInput -> lolwutsUserInput

Either look at the mission file and see how you are being detected, or hex edit your client to stop disableUserInput from working.

Armed Assault 2 / Re: TCG Ban
« on: May 24, 2011, 05:43:20 pm »
I think TCG is bending over and asking for it again.

Armed Assault 2 / Re: Borrowing Serverside Mission files
« on: May 24, 2011, 07:57:21 am »
and I have no respect for the "intellectual property" of some liars who claim others' work as their own and can't even change the German words from the scripts they stole off Chernarus Life.

What? Are people pissed about losing their Kontostad?

Armed Assault 2 / Re: Have fun
« on: May 19, 2011, 05:43:53 am »
Actually your registry key is just your CD-key done up under some fancy schmancy obfuscation, and the BE GUID is made from your CD-Key. (Not so fancy schmancy)

So... related.

Armed Assault 2 / Re: Why Kicked out?
« on: May 18, 2011, 04:36:27 pm »
Experiment. Learn.

It's how we got public bypasses in the first place.

Armed Assault 2 / Re: Why Kicked out?
« on: May 18, 2011, 08:30:03 am »
The whole point of verifysigs=2 is so (noobs like) you *don't* bypass it with WPE...

Unless BI cocked it up again, re-examine the packets or pbos.

Pages: 1 2 3 [4] 5 6 7 8 9 ... 20