![]() |
We make $$ ripping you off!
Ciao,
I come in peace! This is to inform the paysite webmasters that you're being taken to the cleaners financially. A disaster such as this can quickly leave you without a checkbook. My band of thiefs, including myself lurk this and other adult webmaster boards quite often absorbing as much knowledge as we possibly can. Some of your inflated macho egos are simply hysterical compaired to your weakly coded paysites. The average paysite charges anywhere between 15-29+ american dollars to join. Some will invest money in pennywise or strongbox thinking their site is secure. As the two mentioned are not to bad, in my opinion they are not worth the money. Pennywise eg; If we run a Pennywise site like a normal site, with Debugger Info checked, we will get a flood of 200 responses. Upon further analysis we see this. Code:
-------------------- Header -------------------- Until now, unless you knew a "trick", you couldn't test this site using HEAD, or atleast not the main member's url using HEAD request method. After a close examination, we clearly seen that some Header Datas are more detailed than others. For example, two of the returned Headers had the line Content-Length, Last-Modified, and ETag. Manually checking these two combos, they really were hits. When we check some of the other combos which returned the smaller Header, we are sent to a fake page. So what can we do to prevent fakes from this site? The option Recieved Header Key Phrases -> Define Success Key Phrases can now be checked. We know a Header Key Phrase we can use to determine if we got a hit or not. We also know a Failure Key Phrase, we know that all bad responses always have a 401 reply code. Add a Success Key Phrase as "ETag" and a Failure Key Phrase as " 401" (reason for the space before the "4" is because we don't want to mix the HTTP Response up with another number returned from the server). Ok, now we have a Failure Key Phrase checked and one is added, and Success Key Phrase checked and one is added. We then ran the test. After the test finished, we did not have one fake reply and only hits to a once "tough" site. Signora and gentiluomo, google is your enemy. It wouldn't take us under 5 minutes to rape their cache of your user and passes. Stripping CCBills, ibills logs for current information is as easy as taking candy from a bambino. These are the user:pass guidelines of some popular companies used by the no0bs; Code:
2000charge..............U: email, P: 4-10 characters Laugh, joke, ridicule, call this a big scam as you stuff your face with hotdogs. By reading some threads on this forum, you are all aware you're being financially ripped to schreds. I've noticed with great laughter some of you posting mear amatuer sites that house your copyrighted content. Whippie-doo, when one falls its replaced with 4 others. Think about my offer. While you're thinking, this is a board I frequent with a never ending supply of users and passes. http://upload.illuminise.org/files/b...ab79143bf4.jpg Furthermore, the email addy I used to register at GFY is a Canadian .ca stolen email account. Registration verification was clicked with a IP from Poland. The IP I am using on this thead is from Poland. Banning is useless over our other 14 active accounts on GFY. (all with stolen or hijacked email accounts) Fees; 75 American dollars aweek. 200 American dollars a month. Hope to see a reply from you soon or continue spending money buying content. Adult companies are buying advertisment space on our websites! Bravo the porn industry! Ciao bella! Un momento brevissimo, allow your fat sausage fingers to email these hosts. My gift to you. hahaha http://toplist.linkworld.ws/ Ciao! |
i had to post.
|
Without a doubt, one of the more interesting posts I've read in a lonnng time...
Wonder if anyone is going to do business with this crook? -P |
Quote:
|
Quick question for you ...
So you are able to fairly easily crack these paysites that have strongbox / pennywize installed ... but once you make the passwords public, the pass will die pretty quickly no? While you are here trying to extort money from us, might as well give some info as well :) :2 cents: -P |
Sig spot for sale.
|
ah, can't be bothered extorting individually?
|
One more thing, how many paysite owners are actually losing $75+ per week in bandwidth from stolen passwords?
I don't think very many... :2 cents: -P |
Deepsy???? New business model?
|
Ahahaha, this shit is funny...
What a fucking clown.. |
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
|
do you got anything new to say ?
|
Let's see what turn this takes. :)
|
Some kids shouldbnt be aloud on the internet
|
Hehe 15 yr olds these days.
|
Quote:
|
|
Quote:
|
Its time one of the big guys sets an example and sues one of these kids so hard it will take him 2 weeks just to realize what just hit him.
|
I'm going to cut your mommys fucking face off with an X-Acto knife, blow a load on her eyball as she dies and raid your fridge.
Oh yeah, your pets are dead too. |
I mistyped "eyeball".
My bad. Im also going to hack your grammas prune-like ovaries out with a chainsaw. |
Quote:
|
Damn bad-ass mofo
|
Quote:
http://www.depend.com/products/products_male.asp |
Quote:
|
Quote:
|
Uhh... beware the big bad boy is here and he wants to kill the GFY :)
|
Quote:
|
WOW - you really have gone to a lot of trouble to protect your identity.
OK - Ill bite - so where should I send the money? |
Quote:
Fuck that man, I'm all pissed and shit. I'm not holding anything back. This is war. |
bump!!!!
|
Lolllllllllllllllllllllll
|
He obviously didn't read "How To Win Friends And Influence People"
Poor guy should take a lesson in Sales 101 "don't insult, call names or ridicule those you are trying to pitch to" (may lead to them not buying out of spite) |
It's guys like this Cow Bell motherfucker that make this biz so hard to profit from.
All the thiefs and lEet RoXoR hAxOrz and stuff. |
...
:glugglug |
Quote:
|
Deepsy, v. 2.0.1
|
I have a few of these types of posts saved on my hard drive. More fun, everyday.
|
I have no doubt that it's possible to hack/crack passwords. HOWEVER, at the moment these user/passes are posted on forums, they will be locked afte a very short time. SO what is the use of posting sites, using this kind of software?
|
sig mofos! this post is making me laugh
|
|
Nobody is ever 100% anonymous online regardless of what hoops they hop through... :2 cents:
|
The password information on Globill is priceless.
|
I sale web bad boy thug service for cheap..
|
you blackmail people for $200
who's the loser? lol |
a little late but, click my sig and signup! make mad cash!
|
what a fucking joke :1orglaugh :1orglaugh :1orglaugh
|
At least have a better scam than just being able to snag user accounts.
Like if you had a network of zombie computers able to DDOS a site with 10 gigs of useless traffic for days on end. Now that's a good extortion tactic. Any site worth it's weight uses techniques to allow an account only a limited number of concurrent access at a time. And, the content is protected to a degree that it can't be downloaded and resold. Get better and resell your "protection". |
lol unreal......
|
Quote:
Quote:
Quote:
Quote:
Some paysites require you use your email address as your user. Some use their email addresses actual pass for the pass on the site. When we strip the billing companies logs, we check the passes against their email address. We will register accounts in the early morning hours of their time zone. Accept registration to where ever it is we are registering. We then delete the registration from their account and leave the account untouched. Any traces of the actual email account will lead you to the innocent person that created the account since his or her Ip was used to create it. Quote:
a. origional account holder - 1 IP b. multible log-ons with our CGI - 2 IP's Chances are your protection scripts allow a set amount of IP log ons. Once a members user:pass is terminated for abuse, it is quickly replaced. On average we keep atleast 14+ log ons per paysite. Furthermore, members tend to use the same user:pass when they resign up. We keep those log ons and run them at a later date. Ciao bella |
All times are GMT -7. The time now is 12:22 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc