Jump to content

wF's CB against UED


Starcraftmazter
 Share

Recommended Posts

The reason I started this thread was because it has a lot of OOC content.

If you observe the screenshots posted and the reply;

http://forums.cybernations.net/index.php?showtopic=74958

http://forums.cybernations.net/index.php?showtopic=74976

The !@#$%* link in the screenshot is http://!@#$%*.com/a4de44c7f

If you download the !@#$%* codebase,

http://!@#$%*.com/!@#$%*.php?help=1

Take a look at the show part of !@#$%*.php (line 300), then more importantly function getPost on 320 of !@#$%*.class.php, and down to line 430 in the same file. This clearly shows that any incorrect link will in fact get an in-side error message - example: http://!@#$%*.com/m50e37f7

Other types of links, for examples: http://!@#$%*.com/m50e37f7xxxxxxx will get a 404.

You may ask why the heck sometimes you will get an in-site error message, and at other times a 404. The reason you get a 404, is because the php script behind !@#$%* is never executed, instead the request to it is never passed by apache. Some of you who are not familiar with web development may be scratching your heads right now - basically the way sites like !@#$%*, wikipedia and others work in terms of URLs, is using an apache mod called mod_rewrite, which rewrites a url in place and directs the requests for a certain site in a particular way.

For example, say I run an image site, where images are stored in the database - but I want to provide hard links for them.

I could allow users to access images like so:

http://www.site.com/12345.jpg

And then direct mod_rewrite to rewrite the url as:

http://www.site.com/showimage.php?id=12345

Why is this relevant? Because this is precisely what !@#$%* uses, and this is precisely why you get a 404 on invalid links - ie. links which could never exist. Presumably to save on bandwidth from bogus requests or other reasons, all requests which do not conform to a particular pattern of urls which !@#$%* uses are ignored at the web-server level, before they are passed to PHP.

This is the simple code which does it in the default version

	RewriteEngine on
	RewriteRule /([a-z0-9]+) /!@#$%*.php?show=$1

Now as I said, the one on www.!@#$%*.com follows patterns, so it could be something like:

	RewriteEngine on
	RewriteRule /(d|m|f|)([a-z0-9]+){8} /!@#$%*.php?show=$1

There are several prominent patterns - like for instance, all day-long pastebins begin with a 'd', month-long begin with an 'm', and the forever ones begin with an 'f'. There are many others. Go ahead and try to upload anything to !@#$%* for a day, and see what happens to the URL when it expires. Does it 404 or will you get a !@#$%* site error message? Furthermore, check the first letters of your links. Go ahead and upload 10, 100 pieces of text and see if they change.

As you may recall, wF would have you believe that the target list was at this url: http://!@#$%*.com/a4de44c7f which is also a 404.

Thus, it is simply impossible that the link in the screenshot could possibly have been valid, as it is never even considered by the script.

GG wF.

Link to comment
Share on other sites

  • Replies 56
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

I'm beginning to feel slightly betrayed here.

You guys fell for something similar when Ephie hoodwinked you guys.

I suggest you guys do more research into the subject instead of putting it past you to avoid a repeat performance.

Link to comment
Share on other sites

Pardon me for not being a tech-jargon-coding master, but...

tl;dr- wF faked the CB?

Is this what you're saying?

Yes, that's what he's implying. Argh, ninja'd.

This is what happens when CN gets bored and will end well.

Edited by Arrnea
Link to comment
Share on other sites

Oh, so there's no possible way that the nation who gave it to WF faked it?

You better have something to back it up if your standing here and claiming that the damn Viridian Entente faked a screen shot.

I think you will find that in this particular threat, i have not mentioned VE nor made accusations about who faked it. In fact this thread is solely for proving the screenshot and more specifically the link within it, is fake.

Defensive much?

Link to comment
Share on other sites

feeling guilty about something perhaps?

Wouldn't be the first time that's all I'm sayin' :v:

You guys fell for something similar when Ephriam did it and you believed him. Have you learned from that experience?

Edited by The AUT
Link to comment
Share on other sites

Oh, so there's no possible way that the nation who gave it to WF faked it?

You better have something to back it up if your standing here and claiming that the damn Viridian Entente faked a screen shot.

He's not saying you faked it. He's saying someone did. You guys are the least likely party involved to have done it IMO.

Link to comment
Share on other sites

I think you will find that in this particular threat, i have not mentioned VE nor made accusations about who faked it. In fact this thread is solely for proving the screenshot and more specifically the link within it, is fake.

Defensive much?

Might want to go back and change the -t- to a -d- in your first sentence.

Threats usually do incur a defensive repsonse.

Link to comment
Share on other sites

Oh, so there's no possible way that the nation who gave it to WF faked it?

You better have something to back it up if your standing here and claiming that the damn Viridian Entente faked a screen shot.

Calm down Mike Tyson, no one is saying that. Don't bite off an ear.

Link to comment
Share on other sites

Calm down Mike Tyson, no one is saying that. Don't bite off an ear.

Rawr ima pit bull, etc :mellow:

(He did say WF or VE, no matter now thoguh lol)

no it wasn't. You all got played some someone. Now UED and wF just need to shake hands and end it.

This, all will be well soon.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share


×
×
  • Create New...