Page 2 of 2 FirstFirst 12
Results 26 to 49 of 49

Thread: If you've used ArbiBots on PB READ THIS

  1. #26
    Join Date
    Sep 2006
    Posts
    5,219
    Mentioned
    4 Post(s)
    Quoted
    1 Post(s)

    Default

    Quote Originally Posted by kitchenrange View Post
    So, you are saying that it couldn't be done?

    Someone with commit access couldn't change something that would be updated using the hourlies that everytime declareplayers was called, it sent the password to somewhere?

    Even if you could catch them it would be afterwards. I don't know the inner workings of the system, but it seems like that could be done easily.
    It could be done, but you can catch them beforehand, by checking the code after every update and new script. Of course people don't take time to do this, but the point is, encryption wouldn't help.

  2. #27
    Join Date
    Oct 2009
    Location
    Stockton, CA
    Posts
    2,040
    Mentioned
    0 Post(s)
    Quoted
    1 Post(s)

    Default

    I think there is a on update hook for SVN, don't know anything about Git though...
    Somebody could write one and Wizzup could add it. Basically it would be what Boreas said and just scan through all the core files + maybe SMART, for the decryptpassword function being used in any function other than the allowed ones. If it doesn't exist anywhere else, commit, else flag or deny.

    It wouldn't do it for scripts because that is the user's responsibility..
    Join the IRC! irc.rizon.net:6667/srl | SQLite (0.99rc3+) | SRL Doc | Simba Doc | Extra Simba Libraries (openSSL & sqlite3)
    Quote Originally Posted by #srl
    10:45 < Toter> daphil when can get sex anyday I want
    10:45 < Toter> he is always on #SRL
    "A programmer is just a tool which converts caffeine into code"

  3. #28
    Join Date
    Mar 2007
    Posts
    1,700
    Mentioned
    0 Post(s)
    Quoted
    8 Post(s)

    Default

    The easiest way to do this would be for the developers to pack some code in the .dlls to steal your accounts. Or wizzup could simply pack similar code into simba on release, although that possibly could be picked up by virus detection.

  4. #29
    Join Date
    Oct 2008
    Posts
    500
    Mentioned
    1 Post(s)
    Quoted
    0 Post(s)

    Default

    Quote Originally Posted by Boreas View Post
    It could be done, but you can catch them beforehand, by checking the code after every update and new script. Of course people don't take time to do this, but the point is, encryption wouldn't help.
    I concede on the encryption/decryption .

    But my main point was that it could be done, I keep seeing posts, one by you yourself I believe saying that good thing this cant happen at SRL or something similiar. I just didn't want the communities eyes to be closed to the possibility.

  5. #30
    Join Date
    Sep 2006
    Posts
    5,219
    Mentioned
    4 Post(s)
    Quoted
    1 Post(s)

    Default

    Quote Originally Posted by kitchenrange View Post
    I concede on the encryption/decryption .

    But my main point was that it could be done, I keep seeing posts, one by you yourself I believe saying that good thing this cant happen at SRL or something similiar. I just didn't want the communities eyes to be closed to the possibility.
    I don't remember saying it can't happen (I investigated password stealing incidents quite a bit in 2007). Agreed, everyone should be aware of the possibility.

    _____________________________________

    There should be a tutorial on how to check for password stealing. Something along the lines of:
    Your password is stored in a variable called Players[<NUMBER>].Pass. (<NUMBER> is which player in the array, often the variable CurrentPlayer.) It is a global variable in Players.simba, and can be accessed by other parts of SRL, and scripts that include SRL. AFAIK plugins can not access this variable unless it is passed as a parameter of a function in a plugin, called from a script that can access it. The following locations in SRL access it ... The following are ways scripts can access it.... The following are ways it could be stolen...

  6. #31
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by Matsetst View Post
    http://oi52.tinypic.com/nqtkwp.jpg
    Funny name to call it.. stealthbot

    that's a battle.net bot :O

    anyways.. yea.. whatever really did happen (people on SRL say he didn't do the keyloggers) anyway, change your password if you used any powerbot IMO
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  7. #32
    Join Date
    Nov 2008
    Location
    Melbourne, Australia
    Posts
    2,240
    Mentioned
    3 Post(s)
    Quoted
    11 Post(s)

    Default

    On IRC I joined #RSBOT and it had ~30 people, time went on I went to bed I Woke up and it had over 200 people, and I had a PM from some random which said "rsbot got hacked go here to see whether your account is safe" and it was the RS login page (phising lol)
    The LINK BELOW IS TO A SITE THAT WILL STEAL YOUR PASSWORD. IT IS SAFE TO CLICK ON IT AND LOOK AT IT, BUT DO NOT ENTER ANY ACCOUNT INFORMATION.
    <aFrX> rsbot was hacked check if your account is in danger http://powerbothacked . tk
    E: Added spaces between the .tk so you don't accidentally click on it then accidentally click on the phising link and then accidentally write in your username and password
    Last edited by YoHoJo; 02-07-2011 at 02:40 AM.
    Click here to find out how to get full screen without members! | Click here to check out my Ultimate Bitmap Tutorial! Edited to work with Simba! |

  8. #33
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by cycrosism View Post
    On IRC I joined #RSBOT and it had ~30 people, time went on I went to bed I Woke up and it had over 200 people, and I had a PM from some random which said "rsbot got hacked go here to see whether your account is safe" and it was the RS login page (phising lol)
    Just put in an account "gull" pass "ible"

    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  9. #34
    Join Date
    Dec 2006
    Posts
    908
    Mentioned
    1 Post(s)
    Quoted
    17 Post(s)

    Default

    This is probably the most HILARIOUS thing thats happened this year! Gho$t is my idol. However i got to say, close call. I couldve lost my level 136 (however unlikely due to the fact they could just get other level 138 with 1b+ net worth.), and i wouldve...not cared cause i quit and i didnt even put any REAL effort to my account other than paying electric bills if you know what i mean ;p

    To people complaining saying Gho$t is an ass and what not.. Sure he is! But hes the good kind of ass that just taught everyone to be more careful with their accounts. Personally, hes done Jagex a favor about trusting bots.

  10. #35
    Join Date
    Nov 2008
    Location
    Melbourne, Australia
    Posts
    2,240
    Mentioned
    3 Post(s)
    Quoted
    11 Post(s)

    Default

    I just made the user and pass aaaaaaaaaa and it actually redirected me to a proper article.

    Its funny how on the fake RS login screen it says ONLY login if you see the green HTTPS bar on the top, too bad there was none.

    Also, runescape-services? epic fail lol, its runescape.services
    Click here to find out how to get full screen without members! | Click here to check out my Ultimate Bitmap Tutorial! Edited to work with Simba! |

  11. #36
    Join Date
    Dec 2007
    Location
    Williston, ND
    Posts
    3,106
    Mentioned
    0 Post(s)
    Quoted
    3 Post(s)

    Default

    pretty good phishing site, lets spam it with swear words to make their eyes bleed when they read the logs! lol
    Proud owner of "Efferator" my totally boted main account!
    "You see, sometimes, science is not a guess" -Xiaobing Zhou (my past physics professor, with heavy Chinese accent)

  12. #37
    Join Date
    Oct 2006
    Posts
    1,190
    Mentioned
    0 Post(s)
    Quoted
    2 Post(s)

    Default

    anyone else lose anything? i lost about 80 million on two accounts and that was the first time i downloaded powerbot/rsbot



  13. #38
    Join Date
    Aug 2007
    Location
    Colorado
    Posts
    7,421
    Mentioned
    268 Post(s)
    Quoted
    1442 Post(s)

    Default

    Stick to Simba and you'll never have to even worry about future hacks like this, there's no safer method to botting than Scar/Simba.

  14. #39
    Join Date
    Jan 2010
    Posts
    5,227
    Mentioned
    6 Post(s)
    Quoted
    60 Post(s)

    Default

    It can still happen here. It's happened before and it's bound to happen again.

  15. #40
    Join Date
    Jan 2007
    Posts
    8,876
    Mentioned
    123 Post(s)
    Quoted
    327 Post(s)

    Default

    So much hacking going on these days..

    Wikileaks, Egypt hackings, Runescape Hackings....

  16. #41
    Join Date
    May 2007
    Location
    England
    Posts
    4,141
    Mentioned
    11 Post(s)
    Quoted
    266 Post(s)

    Default

    Quote Originally Posted by i luffs yeww View Post
    It can still happen here. It's happened before and it's bound to happen again.
    True, but it's a lot harder to do it discretely here, and get away with it.
    <3

    Quote Originally Posted by Eminem
    I don't care if you're black, white, straight, bisexual, gay, lesbian, short, tall, fat, skinny, rich or poor. If you're nice to me, I'll be nice to you. Simple as that.

  17. #42
    Join Date
    Nov 2006
    Posts
    2,369
    Mentioned
    4 Post(s)
    Quoted
    78 Post(s)

    Default

    Gold4rs owns powerbot right? Maybe they have involved in this somehow... And now selling the gold.

  18. #43
    Join Date
    Jan 2010
    Posts
    5,227
    Mentioned
    6 Post(s)
    Quoted
    60 Post(s)

    Default

    Quote Originally Posted by Rich View Post
    True, but it's a lot harder to do it discretely here, and get away with it.
    I'd say it's just as easy if not easier here, as you can pretty easily hide stuff in scripts. It wouldn't be on the scale as it happened on rsbot, unless someone distributed their own version of simba, but code can be hidden in scripts quite easily. Especially since it'd only take up one line.

    (Not that you can't hide things in java scripts, but people are generally trusted here so people won't be as cautious.)
    Last edited by i luffs yeww; 02-07-2011 at 07:11 PM.

  19. #44
    Join Date
    Jan 2007
    Posts
    8,876
    Mentioned
    123 Post(s)
    Quoted
    327 Post(s)

    Default

    Quote Originally Posted by i luffs yeww View Post
    I'd say it's just as easy if not easier here, as you can pretty easily hide stuff in scripts. It wouldn't be on the scale as it happened on rsbot, unless someone distributed their own version of simba, but code can be hidden in scripts quite easily. Especially since it'd only take up one line.

    (Not that you can't hide things in java scripts, but people are generally trusted here so people won't be as cautious.)
    This is true. Anyone who's released a script could release a new version with a simple GET page in it. It would also be easy for anyone who's got MSI committing rights to do that for MSI.
    Luckily there's no-one in MSI that would do such a thing.

  20. #45
    Join Date
    Jan 2010
    Posts
    5,227
    Mentioned
    6 Post(s)
    Quoted
    60 Post(s)

    Default

    People trusted people who did this in the past but it still happened.

    All I'm saying is that it's not like this is rsbot's fault or anything, it's quite an easy thing to do, hacking that is.

  21. #46
    Join Date
    Aug 2007
    Location
    Colorado
    Posts
    7,421
    Mentioned
    268 Post(s)
    Quoted
    1442 Post(s)

    Default

    I suppose the only safe scripts are user-made then. Our usernames and passwords are stored within the script itself (with the exception of MSI I believe?). I've always been a fan of creating my own scripts and using them, as opposed to other's work for this reason especially. Just take a good look at a script before you use it, it could mean all the difference.

  22. #47
    Join Date
    Jan 2010
    Posts
    5,227
    Mentioned
    6 Post(s)
    Quoted
    60 Post(s)

    Default

    I'd be more worried about MSI tbh, since so many people have access to it and so the chances are higher that one of them would get hacked and someone would do bad things with the access they now have.

  23. #48
    Join Date
    Oct 2007
    Location
    #srl
    Posts
    6,102
    Mentioned
    39 Post(s)
    Quoted
    62 Post(s)

    Default

    Quote Originally Posted by i luffs yeww View Post
    I'd be more worried about MSI tbh, since so many people have access to it and so the chances are higher that one of them would get hacked and someone would do bad things with the access they now have.
    So many people..? There's only 6 of us including RM.

  24. #49
    Join Date
    Jan 2010
    Posts
    5,227
    Mentioned
    6 Post(s)
    Quoted
    60 Post(s)

    Default

    6 > 1.

Page 2 of 2 FirstFirst 12

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •