2017-08-02 at 3:45 AM UTC
aldra
JIDF Controlled Opposition
what
lol, I remember sub7 from high school
2017-08-03 at 4:37 AM UTC
-SpectraL
coward
[the spuriously bluish-lilac bushman]
The author password to the servers was "pizda". So you could just scan for port 27374 on IP ranges and get hundreds of hits and log in even if the server was password protected. Great for storage mules. Good times.
2017-08-03 at 8:26 PM UTC
this thread is beginning to feel like nursing home.
2017-08-04 at 2:01 PM UTC
Originally posted by benny vader
are there false blacks then ???
exactly. that dumb white bitch pretending to be black.
The following users say it would be alright if the author of this
post didn't die in a fire!
2017-08-04 at 3:51 PM UTC
-SpectraL
coward
[the spuriously bluish-lilac bushman]
Sub7 is actually a very cool program. It has a function in it called "pipe", which allows you to run programs invisibly on the host machine while "piping" the results back to your own station. So, for example, you could upload a high speed port scanner to the host machine, execute it to run, then "pipe" the results back to your own box, or pipe the results over to a server somewhere else. The host doesn't receive any output. So the host takes all the blame for the scanning, but the remote machine gets all the results.
Funny story about Sub7... years ago I deciphered the master author password to all versions of Sub7, even the most recent versions (it was something like 745034562833901732), so that allowed me to get into any server at all. One day, I was on a server I had just used the master password on, and low and behold a small chat window pops up on my screen, and it ends up it's MoBMan, the guy who actually wrote SubSeven. So he asks me how the hell I got the password, and when I wouldn't tell him, he became very irate and made a bunch of threats. So we chatted there on the victim's computer for almost an hour, and we ended up walking away friends at the end. True story.
Then I went into the client side program code with a fine-tooth comb and discovered it had a whole slew of hidden functions in it, which could be activated remotely or automatically, such as a self-destruct routine which would activate under certain conditions, and it also had HDKP4 embedded in there so if a certain named person using the program, or if a certain combination of events/conditions existed, it would screw with your RING0 and take you out. It had "call-home" routines in it which activated when you used the master password or a number of other no-no's, such as trying to edit the executable code.