Alright, don't close this, it was just too tempting of a title not to use.
Anyways,
After quite a long time of planning, I am finally getting ready to open up the doors to my GSP pretty soon. One of my biggest worries though has been with the price of bandwidth, having clients fall victim to a DoS attack or something similar in nature.
There are already a lot of SM plugins, VSPs from SourceOP, MMS plugins, etc. that help to prevent specific exploits and attacks, however it can be an absolute pain trying to set all of these up. I have decided prior to opening I am going to work on a VSP (valve server plugin) to eliminate the need for any specific admin mods, that will incorporate all of these fixes and some new ones. I have no problem releasing this to the public, as the main concern is making sure my clients dont fall victim to an easily prevented attack.
So, basically I need the help of you guys to help me exploit SRCDS. I do specifically c++ coding, and since most of the attacks are web based, I really have no idea how to reproduce them. I know there are applications to DoS a server, and there has to be a script or something out there for some of the other issues such as A2C_PRINT spam. If you can help provide me with the tools needed to attack my dev server, so I can thoroughly test this mod prior to release, it would be most appreciated. I wouldn't have any problem giving beta versions to people who help as well.
I do prefer you PM me with tools and/or exploits as obviously we dont want them circulating on the srcds forum. Just in an attempt to prove I am not just someone out to collect exploits for personal gain, heres a link to my SM profile with some feedback on me from past jobs.
http://forums.alliedmods.net/member.php?u=31784
Current Exploit List to Target
1) A2C_PRINT Spam
2) A2S_INFO Spam
3) Invalid Player Names (Empty Names, Bell Characters)
4) Forced Full Update (Empty Packet)
5) Clientside Plugins
6) Half Connected Crash
7) DoS Attack
8) RCON Crash (Too many Login Attempts)
Any help with information on more exploits to add to the list, or help with causing these exploits would be great. Please just keep sensitive material to PMs though!
Anyways,
After quite a long time of planning, I am finally getting ready to open up the doors to my GSP pretty soon. One of my biggest worries though has been with the price of bandwidth, having clients fall victim to a DoS attack or something similar in nature.
There are already a lot of SM plugins, VSPs from SourceOP, MMS plugins, etc. that help to prevent specific exploits and attacks, however it can be an absolute pain trying to set all of these up. I have decided prior to opening I am going to work on a VSP (valve server plugin) to eliminate the need for any specific admin mods, that will incorporate all of these fixes and some new ones. I have no problem releasing this to the public, as the main concern is making sure my clients dont fall victim to an easily prevented attack.
So, basically I need the help of you guys to help me exploit SRCDS. I do specifically c++ coding, and since most of the attacks are web based, I really have no idea how to reproduce them. I know there are applications to DoS a server, and there has to be a script or something out there for some of the other issues such as A2C_PRINT spam. If you can help provide me with the tools needed to attack my dev server, so I can thoroughly test this mod prior to release, it would be most appreciated. I wouldn't have any problem giving beta versions to people who help as well.
I do prefer you PM me with tools and/or exploits as obviously we dont want them circulating on the srcds forum. Just in an attempt to prove I am not just someone out to collect exploits for personal gain, heres a link to my SM profile with some feedback on me from past jobs.
http://forums.alliedmods.net/member.php?u=31784
Current Exploit List to Target
1) A2C_PRINT Spam
2) A2S_INFO Spam
3) Invalid Player Names (Empty Names, Bell Characters)
4) Forced Full Update (Empty Packet)
5) Clientside Plugins
6) Half Connected Crash
7) DoS Attack
8) RCON Crash (Too many Login Attempts)
Any help with information on more exploits to add to the list, or help with causing these exploits would be great. Please just keep sensitive material to PMs though!