Ni3ls
4th February 2015, 11:44
Hi all,
I was looking for the best binaries for cod2 1.0. And I was wondering if somebody could combine all the patches into 1 super binary?
http://killtube.org/showthread.php?1979-Bypass-max-menus-precached-error&highlight=menus
http://killtube.org/showthread.php?1835-Increase-download-speed-COD2-1-0&highlight=slots
http://killtube.org/showthread.php?1719-Latest-cod2-linux-binaries-(1-0-1-2-1-3)&highlight=overrun
And last fix is about bruteforce so rcon cant be used.
From Aluigi
"The Quake 3 engine uses an anti-brute forcing mechanism which tells the
engine to process only one rcon command each half second, and it's not
important if a valid admin sends a valid rcon command because if it's
arrived after another invalid command send by another IP within the
same half-second, it will be dropped.
In short if an attacker sends more than 2 packets per second the RCON service
will become unavailable for the valid remote admin.
That's caused by an anti brute-forcing check which drops all the packets arrived
within half second from the previous one.
http://aluigi.altervista.org/patches/q3rconz.lpatch
So with this binary, you should be able to have 64 menus, 128 slots and call to va() bug patched + localized strings and no rcon block. I have no idea how to do it with that Hexeditor.
I was looking for the best binaries for cod2 1.0. And I was wondering if somebody could combine all the patches into 1 super binary?
http://killtube.org/showthread.php?1979-Bypass-max-menus-precached-error&highlight=menus
http://killtube.org/showthread.php?1835-Increase-download-speed-COD2-1-0&highlight=slots
http://killtube.org/showthread.php?1719-Latest-cod2-linux-binaries-(1-0-1-2-1-3)&highlight=overrun
And last fix is about bruteforce so rcon cant be used.
From Aluigi
"The Quake 3 engine uses an anti-brute forcing mechanism which tells the
engine to process only one rcon command each half second, and it's not
important if a valid admin sends a valid rcon command because if it's
arrived after another invalid command send by another IP within the
same half-second, it will be dropped.
In short if an attacker sends more than 2 packets per second the RCON service
will become unavailable for the valid remote admin.
That's caused by an anti brute-forcing check which drops all the packets arrived
within half second from the previous one.
http://aluigi.altervista.org/patches/q3rconz.lpatch
So with this binary, you should be able to have 64 menus, 128 slots and call to va() bug patched + localized strings and no rcon block. I have no idea how to do it with that Hexeditor.