Tom
08-14-2006, 05:43 PM
Just a quick explaination to how it worked, and how to bypass it.
I cannot be fucked to make a bypass personally, so i'll explain and leave it to someone else to pick up the excrement.
Brief overview - How it worked.
User entered CokeStudios.org Username/Password
Script checked against the user table for the forums
If successful, a php script would echo the IP long, followed by a 1.
If unsuccessful, it would do the above, followed by a 0.
How to bypass
You'll probably need hosting with a dedicated IP if you want this to be uncomplicated.
Create a PHP script (scripts/auth.php, I think, you'll have to check the packets with WPE or something) with the following:
<?php echo(ip2long($_SERVER["REMOTE_ADDR"]) . '1'); ?>
Now set it up on your webhost, and use your Windows hosts file to direct 'www.cokestudios.org' to your hosting IP.
Hope that clears some things up.
Tom/Takeshi.
I cannot be fucked to make a bypass personally, so i'll explain and leave it to someone else to pick up the excrement.
Brief overview - How it worked.
User entered CokeStudios.org Username/Password
Script checked against the user table for the forums
If successful, a php script would echo the IP long, followed by a 1.
If unsuccessful, it would do the above, followed by a 0.
How to bypass
You'll probably need hosting with a dedicated IP if you want this to be uncomplicated.
Create a PHP script (scripts/auth.php, I think, you'll have to check the packets with WPE or something) with the following:
<?php echo(ip2long($_SERVER["REMOTE_ADDR"]) . '1'); ?>
Now set it up on your webhost, and use your Windows hosts file to direct 'www.cokestudios.org' to your hosting IP.
Hope that clears some things up.
Tom/Takeshi.