[GNU] Exousia(#8447)
08-Jan-2012 04:55
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Hey
jager (#10302) Edit PM 03-Jan-2012 04:57:25
true almost everytime. Except one time:
open IP database, check one server with those checkboxes and click button Bounce at the bottom of the list. That uses function, that takes ID not IP from that server and bounces to it.
bugshunter (#35091) Edit PM 03-Jan-2012 04:53:46
the thing is that as i can see, when you connect to a server, you use the ip, not id... or i don't know well enough ?
jager (#10302) Edit PM 03-Jan-2012 04:50:10
it's actually very simple if you want to use that exploit. In about an hour you can have javablocked parser with php/mysql backend, where you store all ID. Then it's simple to cycle them and getting new IPs...
bugshunter (#35091) Edit PM 03-Jan-2012 04:49:26
jager, i've already bypassed emi's restrictions and that random stupid javablocked
so, he needs to up his game... i started to play this game for fun.. but seems like after all, it's a good lesson about blockeding
jager (#10302) Edit PM 03-Jan-2012 04:49:02
Just be sure to check about any hidden variables when submitting your forms. You can get current variable by unserializing that hidden eval code with javablocked.