vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   Modification Requests/Questions (Unpaid) (https://vborg.vbsupport.ru/forumdisplay.php?f=112)
-   -   adding a anti ddos hack to vbulletin (https://vborg.vbsupport.ru/showthread.php?t=114629)

xss illz 05-02-2006 10:07 PM

adding a anti ddos hack to vbulletin
 
ok its obvious there hasnt been a coder to create this hack but my friend uses phpbb and theres a firewall anti ddos hack....i was wondering if anyone could mod this hack and get it working with vb........

the hack url....(please just delete the url if its not allowed to be posted)

Code:

http://www.phpbbhacks.com/download/6317
the script.......

Code:

#################################################################
## Mod Title: Simple Firewall (Anti DOS)
## Mod Author: BaoChung (VietNam) < wall85vn@yahoo.com > http://vietshare.tk
## Mod Version: 1.0.0
## Mod Time: 25/03/06
## Mod Description: This mod will keep your forum safed from DOS.
##                  Simply, users have just gone to the forum after they clicked on a button
##                  (DOS can't click on that button). That is my way ^_^
##               
## Installation Level: Very Easy
## Installation Time: 1 Minutes
##
## Files To Edit: 1
##                common.php
##
## Included Files: (none)
##
## NOTE: it can have some non-acuracy, tell me if you have
##      a problem with it.
##
#################################################################


#---[OPEN]-------------------------------------------------------
        common.php

#---[FIND]-------------------------------------------------------

if ( !defined('IN_PHPBB') )
{
        die("Hacking attempt");
}

#---[AFTER, ADD]-------------------------------------------------

//BEGIN: Simple firewall
//Create by BaoChung
session_start();
if (empty($HTTP_SESSION_VARS['letgo']))
{
        if (!empty($HTTP_POST_VARS['letgo']))
        {
                session_register('letgo');
                $HTTP_SESSION_VARS['letgo']='xaquebaochung';
                header("location: index.php");
                exit();
        }

        $sform='<html>
        <head>
                <title>VIETShare :: Forum :: Funny from your sharing</title>
                <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
        </head>
        <body bgcolor="black">
        <p>&nbsp;
        <p>&nbsp;
        <p>&nbsp;
        <p align=center><font face="tahoma" size=2 color="white"><b>Wellcome to VIETShare ! </b><br><a href=http://vietshare.tk>http://vietshare.tk<a/></font>
        <p align=center>
        <table>
        <tr><td>
                <form name="sercform" method="POST" action="index.php">
                        <input type="submit" value="Enter Forum" name="letgo">
                </form>
        </td></tr>
        </table>
        </body>
        </html>';
        echo $sform;

        exit();
}
//END: Simple firewall

#---[NOTE]-------------------------------------------------------
        You are may be need to modify HTML code for your purpose.
        But, don't change name of button ("letgo")

#
#-----[ SAVE/CLOSE ALL FILES ]-----------------------------------
#
#EoM


xss illz 05-12-2006 06:21 PM

uppin

Protoman 05-13-2006 01:12 PM

I don't see how this can work. the idea sounds good, but their code just has the user click a button to enter the site. most newer bots can click right through forms, so.. method is somewhat flawed

Marco van Herwaarden 05-13-2006 02:12 PM

I wouldn't use the terms Anti-(D)DOS or firewall for this.

The only way to stop a (D)DOS attack is to make sure that the traffic never even reaches the webserver, or if that is not possible, that the traffic is null routed as early as possible (preferable on the protocol layer).

First place, and only real effective, to stop a (D)DOS attack, would be on the borderline routers of your DC. The better hosting companies will have special hardware in place to help mitigating such an attack.

If you let the attack reach any page, it would still be able to overload your server, if that page reaches a forum or not. Actually a lot of (D)DOS attacks don't even try to open a page. They simply start the connection handshake to your webserver, but never answer the response (leaving an open connection).

itvns 07-30-2006 12:27 PM

This use for phpbb not use for vbb ok

AN-net 07-30-2006 01:45 PM

it seems this intergrated already in vBulletin, as vBulletin does not allow outside post submissions.


All times are GMT. The time now is 08:45 AM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.01002 seconds
  • Memory Usage 1,730KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (2)bbcode_code_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (6)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete