GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   We make $$ ripping you off! (https://gfy.com/showthread.php?t=531373)

Shap 11-01-2005 02:36 PM

I haven't read everybody's post here. But one thing I have to say is having the attitude of FUCK CRACKERS and SCREW these thieves is WRONG! You guys can have that attitude, I think it makes you more of a target. Look none of us are 100% secure and if you think you are you are wrong! Somebody has access to your server. So why piss them off? Why view them as your enemy? I think they can be much more of an asset if you put your ego aside and try to work with them instead of against them. I don't know Ciao Bella but you can be damn sure he isn't alone and someone out there has access to your shit!

MaDalton 11-01-2005 03:39 PM

are you those people that cost me 2000 bucks this month cause you hacked my Pennywize???

i want to say thanks personally - please send me your address

camouflaged123 11-01-2005 03:45 PM

very interesting post for sure!!

ElvisManson 11-01-2005 03:51 PM

Is it just me, or does it look like Ciao Bella is fishing for info.

Seems to me like he has run into some issues he can't hack/crack and is looking for ways around it.

Anyone who has a members area uses multiple ways to prevent/limit password/bandwidth theft. Any info we give this person has the ability to further compromise all of us.

just my :2 cents:

KCat 11-01-2005 04:56 PM

Love it! The Internet mafia...gotta cough up money every month for protection.

Ciao bella 11-01-2005 05:37 PM

Quote:

Originally Posted by shap
I haven't read everybody's post here. But one thing I have to say is having the attitude of FUCK CRACKERS and SCREW these thieves is WRONG! You guys can have that attitude, I think it makes you more of a target. Look none of us are 100% secure and if you think you are you are wrong! Somebody has access to your server. So why piss them off? Why view them as your enemy? I think they can be much more of an asset if you put your ego aside and try to work with them instead of against them. I don't know Ciao Bella but you can be damn sure he isn't alone and someone out there has access to your shit!

Sė, signore, you're intelligent. All free email addresses including all .com addys are banned except for .edu.

Code:

berkeley.edu
rutgers.edu
udel.edu
ucf.edu
ccsu.edu.
fsu.edu

+ 80 other universities not listed here.

We supply 53,000+ university students with access to adult paysites. Our many clients who major in computer science find it educational bypassing site security features. Last semester many submitted their findings as part of their finals.

It's astonishing reading the inflated ego's on this forum. The website security solutions mentioned by some have been defeated. We store all former website access hits on 1 of our other servers. To have a select amount of tries per IP before that IP is blocked does'nt stop our batches. As you are aware, many clients use the same user & pass when they re-apply to see the updates. Running a 3500 access batch on those produce 650+ active accounts. If our supply doesnt meet our demand, we rape your billing company logs. For the day or whenever, the proxies we used on 1 site are blocked, we have 1000's of other sites to run batches on where our proxies are not blocked. As I am sitting here, I just raped a cache and have accumulated 79 ISP proxies.

The above entry is only 1 example how we obtain access.

Quote:

Originally Posted by MaDalton
are you those people that cost me 2000 bucks this month cause you hacked my Pennywize???

i want to say thanks personally - please send me your address

Probroly a good reason to read a book. You cant operate a online E-Comerce waking up at noon, eating chocolate and watching soap-opera's all day. Filet mignon to kraft mac & cheese. Perhaps you should follow Shap's advice. He'll accell in this industry while you're chatting with the homeless at the soup kitchen.

Quote:

Originally Posted by KCat
Love it! The Internet mafia...gotta cough up money every month for protection.

If we are the internet mafia, what are strongbox and pennywise? Do not some pay them for protection? Security protection they know that has been compromised. :1orglaugh

Quote:

Originally Posted by angermanagement
this dude fucking owns you smut peddling pieces of garbage

:pimp

Bravo the porn industry, bravo!

Ciao bella

DraX 11-01-2005 05:41 PM

I just wants to be part of this thread

georgeyw 11-01-2005 05:57 PM

Quote:

Originally Posted by Ciao bella
Sė, signore, you're intelligent. All free email addresses including all .com addys are banned except for .edu.

Code:

berkeley.edu
rutgers.edu
udel.edu
ucf.edu
ccsu.edu.
fsu.edu

+ 80 other universities not listed here.

We supply 53,000+ university students with access to adult paysites. Our many clients who major in computer science find it educational bypassing site security features. Last semester many submitted their findings as part of their finals.

It's astonishing reading the inflated ego's on this forum. The website security solutions mentioned by some have been defeated. We store all former website access hits on 1 of our other servers. To have a select amount of tries per IP before that IP is blocked does'nt stop our batches. As you are aware, many clients use the same user & pass when they re-apply to see the updates. Running a 3500 access batch on those produce 650+ active accounts. If our supply doesnt meet our demand, we rape your billing company logs. For the day or whenever, the proxies we used on 1 site are blocked, we have 1000's of other sites to run batches on where our proxies are not blocked. As I am sitting here, I just raped a cache and have accumulated 79 ISP proxies.

The above entry is only 1 example how we obtain access.

Probroly a good reason to read a book. You cant operate a online E-Comerce waking up at noon, eating chocolate and watching soap-opera's all day. Filet mignon to kraft mac & cheese. Perhaps you should follow Shap's advice. He'll accell in this industry while you're chatting with the homeless at the soup kitchen.

If we are the internet mafia, what are strongbox and pennywise? Do not some pay them for protection? Security protection they know that has been compromised. :1orglaugh

:pimp

Bravo the porn industry, bravo!

Ciao bella

Very interesting...

Now todays english lesson

Probroly - probably*

Accell - excel*

Thank you

ps - Uni students handing papers about how they broke the law isn't a very intelligent thing to do :2 cents:



* I'm guessing these are the words you meant as you're spelling wasn't even close to correct

ServerGenius 11-01-2005 06:01 PM

see sig! Pay me protection money to protect you from paying protection money Hey at least I'm cheaper than those scriptkiddies :1orglaugh :1orglaugh :1orglaugh

pussyserver - BANNED FOR LIFE 11-01-2005 06:03 PM

please someone tell me they have a copy of that board screen shot???

Jimbo 11-01-2005 06:07 PM

Quote:

Originally Posted by reynold
these fucking paysites are actually making money from these morons hacking passwords by creating different members area just for them to think they hacked into but with advertising link exchanges and shitty content.


did you just copy paste my post or just read my mind way too much hehe?

MaDalton 11-01-2005 06:10 PM

Quote:

Originally Posted by Ciao bella
Probroly a good reason to read a book. You cant operate a online E-Comerce waking up at noon, eating chocolate and watching soap-opera's all day. Filet mignon to kraft mac & cheese. Perhaps you should follow Shap's advice. He'll accell in this industry while you're chatting with the homeless at the soup kitchen.


Ciao bella

yeah - actually you made some decisions much easier for me - so as i said: thank you

The Duck 11-01-2005 06:17 PM

http://www.pvip.com/sigplacement.gif

RonUSMC 11-01-2005 06:26 PM

You are a script kiddie. You are only as good as your scripts you get from IRC from ENET, you jackass. You should hop over to the phishers channels and exchange paypal IDs like the rest of the them.


http://www.halogod.com/albums/Owned-...urwords2yg.jpg

SeniorX 11-01-2005 06:52 PM

lol, is this for real? One question "Ciao Bella" - how do you expect to get paid?

When someone would order your "service" and send you a wire/western union/check/paypal/epass/egold/cash to po box or whatever, they'd have your info in no-time with the anti-terrorism laws these days... and then the only question that remains is if the next knock on your door will be the good guys or the bad guys.

Dugan 11-01-2005 07:18 PM

Good question would be...what the fuck are you talking about?
how are you getting the billing companies log files? I call bullshit on that one.

darnit 11-01-2005 08:13 PM

I want the last 5 minutes of my life back. :(

LittleMack 11-01-2005 08:53 PM

page 3 and still ok sig placement space...see sig

bashbug 11-01-2005 09:14 PM

funny cia bella whatever your name is. htpasswd isnt hard to break, its like you just discovered accessdiver and a user name and password list, yes pennywize is a crap product, cause it allows 8 ips per day from the same host just incase your dialup changes etc. so yes running a proxy list against it doesnt take long. and many of the sites still use htaccess which is a fault. ever since ray installed strongbox on exploitedteens their password sharing has been brought down. passes used to be on forums , irc channels, etc. but ray would love to see how you can break by image verify. no one is going to pay you for anything. its password security on sites. you are just another number. lots of people have free porn, the money we make is about the people that dont know about free porn. we dont want your surfers. they are garbage. so i dont think anyone cares what you have to say about this matter. anyone can search on google or goto wt50 or goto chumash's site.

pocketkangaroo 11-01-2005 09:24 PM

Oh crap, I need to get out of this industry right away. Some kid got a hold of a cracker.

chaze 11-01-2005 09:28 PM

DWHS has a custom script that blocks this shit for free. Infact it's installed on all servers for every account by default.

Problem solved. :winkwink:

We learned this lesson back 2002.

adultchica 11-01-2005 09:31 PM

Who bumped this thread ? I thought this was old news

Radik 11-01-2005 09:34 PM

Yeah same, i wrote a custom package after pennywize failed so badly; it's not the users you need to trap, it's the proxy bots. Firewalls and open proxy rbl's are your friend. On another note alot of people consider the password sites good exposure.

MrChips 11-01-2005 09:55 PM

To be truthfull dudes - the wankstains that use hacked passwords wouldnt pay for a membership if they COULDNT get a hold of a hacked password - they would wank over free porn.

Most people who use a stolen password probably cant afford to own a credit card so paysites wont lose money anyway.

Doctor Dre 11-01-2005 11:03 PM

Jeez guys ... you got 3 options ...
option #1 : Have the hackers on your side
option #2 : Hate on the hackers, and become a bigger target
option #3 : Try to get people to investigate and pray they get busted. Not likely to happen.

Doctor Dre 11-01-2005 11:04 PM

P.S. about anybody that say stolen password traffic is useless, you are WRONG ! spywares and dialers and stuff like that always works fine ;)

cranki 11-01-2005 11:15 PM

interesting read here -> bookmarked ;)

subVERSION 11-01-2005 11:52 PM

Not that I'm on the enemy's side.

But.... NONE of you gentlemen have even came close to giving as complete of an intelligent response as he's been.

Even if he couldn't really do what he's saying.

This mutherfucker knows how to market his services.

Job well done. :1orglaugh

And FYI, What he's saying is quite possible. No doubt about that.

Shap 11-02-2005 12:24 AM

Quote:

Originally Posted by TheNewKid
Good question would be...what the fuck are you talking about?
how are you getting the billing companies log files? I call bullshit on that one.

Think again. I have absolutely no doubt about that one. I've seen it happen.

Shap 11-02-2005 12:25 AM

Quote:

Originally Posted by Doctor Dre
Jeez guys ... you got 3 options ...
option #1 : Have the hackers on your side
option #2 : Hate on the hackers, and become a bigger target
option #3 : Try to get people to investigate and pray they get busted. Not likely to happen.

I'll take Option 1 all day everyday.

Shap 11-02-2005 12:26 AM

Quote:

Originally Posted by subVERSION
Not that I'm on the enemy's side.

But.... NONE of you gentlemen have even came close to giving as complete of an intelligent response as he's been.

Even if he couldn't really do what he's saying.

This mutherfucker knows how to market his services.

Job well done. :1orglaugh

And FYI, What he's saying is quite possible. No doubt about that.

What he's saying is reality.

Doctor Dre 11-02-2005 12:28 AM

Quote:

Originally Posted by shap
I'll take Option 1 all day everyday.

No doubt

even the gov does ... watch Catch me if you can ;)

Shap 11-02-2005 12:31 AM

Quote:

Originally Posted by Doctor Dre
No doubt

even the gov does ... watch Catch me if you can ;)

EXACTLY.

selena 11-02-2005 12:42 AM

Very interesting read. Frankly, lots of it is over my head, but the poster sounds like he knows what he is talking about to me.

Due 11-02-2005 01:03 AM

Didnt read it all.
But a easy fix could be making logins PHP based with sessions and cookie verification.
before your user / pass match function put
<?
sleep(1);
?>
In case of failed user pass put:
<?
sleep(5);
?>
in case of visitor comming through a proxy put a extra function that requirre image verification.
It will take 1 second to login if you enter a successfull user / pass, and 6 seconds before you get a responce if you enter a wrong combination.
To make it more complicated you can additionally set PHP to return random apache headers.
It wont stop hacking completely, but slow down the process so it will hardly be worth the effort.
PHP w session / cookie based authorization can also be used as regular htaccess returning "200 OK" login for all requests, but only showing the actual content for people that made a match

moneymotivates 11-02-2005 04:09 AM

Quote:

Originally Posted by Doctor Dre
No doubt

even the gov does ... watch Catch me if you can ;)


great movie, just watched it the other day :thumbsup

Ciao bella 11-02-2005 09:54 AM

Quote:

Originally Posted by Doctor Dre
P.S. about anybody that say stolen password traffic is useless, you are WRONG ! spywares and dialers and stuff like that always works fine ;)

How can you tell what is stolen pass traffic from paying client traffic? The fastest way to destroy your reputation.


Quote:

Originally Posted by subVERSION
Not that I'm on the enemy's side.

But.... NONE of you gentlemen have even came close to giving as complete of an intelligent response as he's been.

Even if he couldn't really do what he's saying.

This mutherfucker knows how to market his services.

Job well done. :1orglaugh

And FYI, What he's saying is quite possible. No doubt about that.

You are correct signore. Negitive response people either do not own paysites or are ignorant surfers searching for acceptance.

Quote:

Originally Posted by shap
Think again. I have absolutely no doubt about that one. I've seen it happen.

Eccellente signore Shap, he knows this industry.

http://www.gofuckyourself.com/showth...72#post8541672
http://www.gofuckyourself.com/showth...82#post8541682
http://www.gofuckyourself.com/showth...87#post8541687


Quote:

Originally Posted by Due
Didnt read it all.
But a easy fix could be making logins PHP based with sessions and cookie verification.
before your user / pass match function put
<?
sleep(1);
?>
In case of failed user pass put:
<?
sleep(5);
?>
in case of visitor comming through a proxy put a extra function that requirre image verification.
It will take 1 second to login if you enter a successfull user / pass, and 6 seconds before you get a responce if you enter a wrong combination.
To make it more complicated you can additionally set PHP to return random apache headers.
It wont stop hacking completely, but slow down the process so it will hardly be worth the effort.
PHP w session / cookie based authorization can also be used as regular htaccess returning "200 OK" login for all requests, but only showing the actual content for people that made a match

Bravo signore! In reality, many paysites implement those security features. To no avail do they work. Sceptable of my claims? May I introduce you to sites that offer better coded security than your example.

http://upload.illuminise.org/files/e...a692a58c86.jpg

Strongbox defeated!


http://upload.illuminise.org/files/3...56c457fc2b.jpg


teentopanga proxy block & OCR (image) log-on defeated.
New page to stop hackers? Lets see how their security works.


http://upload.illuminise.org/files/2...8b29e7648b.jpg

Doesnt seem their new security page stops hackers. Defeated!


Gaining unauthorized access is a challange. Most programmers today are old school coders. They do not respect or realize the know-how of todays crackers. Deluxpass was mis-advised thinking automatically generated numerical users & passes would defeat us. Deluxpass learned a hard & costly lesson. Reviewing the prices of Strongbox are ridiculous. You can have the best security possible on your site. If your billing company is weak, your site is weak. It's not only your billing company, google and msn spiders tear you a new hole.

Some billing companies require the client to use their email addy as their user. Many use their email addy pass as the site pass. We check for that error in judgement and have 1000's of stolen email addresses. We use those email addresses to register on places like GFY. Not only is your site security breached, so are your clients email addresses. Some accounts hold interesting data from other sources.

We keep our message board secure. Only .edu email addresses are accepted. University students will not report us over the chance their future careers could be jeopardized. Futhermore, some of their fellow university students code for us. Wouldnt be healthy for them to be a hero. Its a constant rotation of college students. Each graduating class is replaced with freshmen. Replacement includes word of mouth which adds new universities each fall.

Some mentioned the ugly word extortion. Signore, we do not want your $$. We make more $$ off your members area then you can pay us.

Grande rispetto signore Shap & subVERSION!

Bravo the porn industry, bravo!


Ciao bella

NickJ 11-02-2005 11:02 AM

I come in Peace..

:thumbsup

Screaming 11-02-2005 11:09 AM

I take it no one has sent him any money yet?

Nicky 11-02-2005 11:40 AM

Interesting to say the least.


All times are GMT -7. The time now is 02:03 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc