Home › Forums › Archives › Instant Messaging › Yahoo! Messenger Support › How Yahoo booters *REALLY* work.
- This topic has 45 replies, 18 voices, and was last updated 17 years, 7 months ago by
bulb1234.
-
AuthorPosts
-
September 20, 2006 at 3:41 pm #152357
Soda
Member@tim2679 207513 wrote:
Soda, where exactly in Torseq Tech post does he take credit for someone else’s work ?
If you would actually read what he posted you will see he only gave information
on how to try and prevent from being booted. No where does he state he came
up with the methods that he posted. I am not being mean just hate seeing someone
being blamed for something to did not do.Noteing that he telling the same **** i said on a fourm here a few day befor he post he just point the topic a little differnt in what i said,But this orignally was my idea been doing it for months and then he all of sutten posted this on this fourm.But yes you right i was kinda in a bad mood lastnite
September 20, 2006 at 7:40 pm #152344Torseq Tech.
MemberA bit confused here, Soda. You’re one angry soft drink (must be too much carbonation?). What exactly have I used of “yours” again? You do realize that YMSG/HTTP has been known to be “unbootable” for years now, right? It doesn’t take any knowledge of Yahoo! to know this either. Look at how HTTP works, how data is POSTed and GET requests are made and you’ll see very quickly that HTTP connections are not single entity dedicated connections. Avoiding the flooding effects by using such a protocol that encapsulates your YMSG chat data would make sense to avoid being booted, wouldn’t it? I figured this out on my own and I could elaborate on how it works and even alternate methods to prove that I didn’t “steal” this idea from you or anybody else. I’m sure many others have at least had the thought of logging into YMSG/HTTP and then using Chat 2 at the same time (they were doing this with YCHT and YMSG – dual logins for YEARS). It’s more or less common sense, Soda.
I have never heard of this “Cguard” application but if it uses exactly what I’m talking about here then this should prove to you that you’re not the only one with such “knowledge” of this concept. I’ve also never heard of you nor have I ever spoken to you or downloaded any of your applications, I write my own. But, since you are claiming you are the original sole “founder” of such a marvelous discovery, elaborating on what I mentioned previously should be no problem for you:
Quote:This works because YMSG protocol (including YMSG/HTTP) has priority/precedence over Chat 2 protocol and it overrides all of the packet types that you can receive such as chat invites and PMs. There’s a way to toggle this back and forth from the YMSG connection not getting priority and the chat 2 connection receiving the PMs and chat invites but then this will make your chat 2 connection “bootable” by means of flooding (back to square one). What could be done is to toggle it on when you’re not under attack *so you can receive your PMs and chat invites on the Chat 2 connection normally* and when you are under attack shift the priority back to YMSG/HTTP receiving that traffic so your Chat 2 (room) connection is unaffected.Shifting the traffic flow of PMs and chat invites, how would that be accomplished with “your” method or doesn’t this Cguard have that ability ‘yet’?
Soda wrote:
Quote:OKay here i’ll explain in wannabe tearms okay you take your bandwith and take someone else bandwith if they have a higher bandwith then the user there trying to send.it’s using yahoo protocol to boot that person witch this means BUFFER OVER FLOW okay good you with me now?For one overflow is a single word and secondly you’re using “buffer overflow/overrun” in the wrong context. Maybe before I post from here on out I’ll check with you on whether or not I’m allowed to mention certain material as you may have *by chance* already privately discovered it, okay? I know the one thing I wouldn’t check with you on is spelling.
September 21, 2006 at 1:21 am #152332Dermot
ParticipantHiya Torseq Tech,
You and i both know this has been out a long time and used by a few people for a long time, and i posted on another chat thread to “soda” about people using the YMSGHTTP and Chat2 already, he just responded calling me names…
I was reading about his “cguard” just the other day and about it “stealing id’s” and the person had a picture of it doing so but i can’t find it at the moment.
The mere fact that “soda” makes booters and applications to harm Yahoo!’s network and peoples chatting experience i will “never” use any of his applications.
The use of the YMSGHTTP and Chat is not a secret anymore and can be done very easily a couple of ways without the need for “cguard”.
If you have Firefox browser and IE you can get a WML extension for firefox and login to wap at Yahoo! mobile which uses YMSGHTTP and open a Chat2 session in IE and you’re making yourself very resistant to booters.
You can also Sign into messenger under the Connection settings “Firewall with no proxies” and turn all pm’s off to anybody not on your buddylist and open a chat session in IE or a Chat client you use to the same effect..
You can log into the Yahoo! web messenger in one tab in IE and open a chat session in Chat2 in another tab to also get the same required effect.
Of course all these require you to login to each with the Same id.
September 21, 2006 at 3:14 am #152345Torseq Tech.
MemberQuote:If you have Firefox browser and IE you can get a WML extension for firefox and login to wap at Yahoo! mobile which uses YMSGHTTP and open a Chat2 session in IE and you’re making yourself very resistant to booters.I’ve used this before for experimentation purposes (nothing more). While it’s capable of sending and receiving IMs, Add buddy requests and friends status messages it isn’t a substitute for YMSG/HTTP because WAP (WML/HTTP) is HTTP without the use of YMSG as far as both the authentication negotiation and the session data goes. With YMSG/HTTP (firewall with no proxies) it not only supports everything that YMSG does *the packet types which increase per version* but both the authentication and the whole session’s packets are all YMSG packets just carried over HTTP (specifically designed by Yahoo! for getting around firewalls). It attempts to “fool” corporate firewalls, ones that might be used at a college campus or in a business environment, into thinking that all the traffic is standard “web” traffic. Some of the smarter firewalls with a technology called ‘protocol anomaly detection’ would instantly recognize that the traffic as not conforming to typical web traffic patterns (and data encapsulation) and it wouldn’t be allowed to leave the network.
I haven’t used this “CGuard” program and I don’t plan to so I can’t comment on whether or not it actually does do what has been suggested in terms of malintent.
When I talk about YMSG/HTTP I only mean the firewall with no proxies option in Messenger since it’s used there. I’m not a big fan of HTTP in general especially when used for IM but when coupled with Chat 2 they coexist nicely in the Yahoo! IM environment. If you were to PM flood a user that’s logged into both of these protocols (with the same ID) the PMs would go through the YMSG/HTTP session as would the chat invites which was discussed before. There’s a way to reverse that traffic flow and have it all go down the Chat 2 connection and you could receive all of your PMs and chat invites instead of through YMSG/HTTP *default*. If this Soda guy can’t figure it out I’ll post the answer for anyone that would like to know how to do it and you can instantly see how going from “unbootable” to “bootable” can be changed so easily by simply knowing where to direct the packet types that are sent to you during your “dual” session.
I can say, however, that I don’t find this anti-boot solution to be a very efficient one. You shouldn’t have to have two simultaneous sessions taking place just to avoid being flooded eventually (or instantly depending on your connection & the boot method) leading to disconnection.
September 28, 2006 at 8:57 pm #152359Mr-DoS
Memberok i would like to note one thing on behalf of Soda… His CGuard does not steal id’s that image has a space after his name that proves it wouldnt send that pm .. also i have seen the source to this and it pm’s a user with the username to show that they are using CGuard as a form of protection ..since he didnt impalement his good security
September 28, 2006 at 10:39 pm #152333Dermot
ParticipantQuote:since he didnt impalement his good securityWhat good security is a booter who makes a anti booter? and claims he made it and wants credit for it when it’s been used by many for years?
To be honest, i won’t be using no booters program, good or bad, but then thats my personal choice as is anybodies who sees or trys it.
But the fact is there are programs out there made by booters that steal peoples id’s and passwords taking e-option strings and whatever else and people should be made well aware of it even if this case it is or not, all people should be weary of downloading any program off a open community.
However coming on to a forum cursing and swearing and calling names is not the best of starts for showing competence in their programs for any programmer.
Quote:however, that I don’t find this anti-boot solution to be a very efficient one.I concur to this fact as i have found YMSG/HTTP connection to be very unstable and has a habit of just disconnecting for no apparent reason, and having to hide behind a unstable situation to just be able to have a decent chat is unacceptable and people shouldnt have to do it.
September 28, 2006 at 11:54 pm #152346Torseq Tech.
MemberAs dermot said:
Quote:I concur to this fact as i have found YMSG/HTTP connection to be very unstable and has a habit of just disconnecting for no apparent reason, and having to hide behind a unstable situation to just be able to have a decent chat is unacceptable and people shouldnt have to do it.Which is exactly why I won’t be using this anti-boot option anytime soon (if at all) for my application. While there are a couple ways to stop the frequent disconnects, as I’ve said about this before, you should never have to have two sessions going on simultaneously just to combat being flooded. While it works great it’s just too inefficient for a serious “solution”. This could be implemented cleanly and I could think of some ways to make it work out extremely well but it’d require some extra work that I’m not willing to put in for such a small percentage of chatters that would actually need it *dial-up users, mainly*.
September 29, 2006 at 2:29 am #152358Mr-DoS
Member:)) i dont like Soda.. infact i dispise him i only steped in k0z its my job to diss on em
September 30, 2006 at 5:11 pm #152360Mr-DoS
Memberno no no @ Dermot… not that he was oringally going to sell the program but somone leaked a dirty version. that wasnt even made by soda it was the same source but someone edited it to make it send a user name + password when soda only had the user name
Soda was just stupid to give the source to someone
October 2, 2006 at 1:20 am #152334Dermot
ParticipantOn a better note
Welcome to bigblueball Mr-Dos
to reply to your post,
Quote:but somone leaked a dirty version.Quote:Soda was just stupid to give the source to someonemoreso a reason to warn users of downloading such files.
i know what the formentioned user does and what effects they have, lets not be under any delusion, He can be malicious and make programs to do just that and cause grief for other chatters on yahoo!
However i will leave it at that as this topic has gone on long enough.
🙂
October 3, 2006 at 2:16 pm #152361ultra_great
MemberThe explaination given of how a booter works was very thoruogh. I too have made some simple chat clients and lots of booters. I myself feel you left some things out about how a booter works. I myself feel it was just a pitch to promote your product. Or else you would have included some other things and you would have mentioned the fact that your chat client is very bootable. Like some one had said it dont matter what you are using if they want you booted you will be booted. All they gotta do is even go to my site lots of booters there, many of which WILL boot YMLITE, MESSY, YAZAC, YEHLITE, YTUNNEL, AND MORE. Instead of going through the trouble of downloading and installing a 3rd party client of any kind it is much simpler and works just about as well(maybe better in some cases)…..Before entering chat just go into your messenger settings and shut down pretty much everything except for PMs from freinds. This includes cam, chat, photo share, conference, and file invites. And the reason you can except PMs from freinds , but no one else is this….. Boot programs use bot ids in the program to send the boot packets. In most cases they ar enot going to be using thier own id in the program. The programs can be made to use from 1 bot to an unlimited number of bots. This will not protect you from all possibilities of being booted, but it will be a very great help. I would also like to add the fact the it DOES NOT matter a great deal of what internet connection speed the person is using to operate the booter. I have just finally recently switched from 56kbps dial up to 3.0mbps DSL. I myself booted more people and better on my old dial up connection. So really folks do not try to let this guy fool you with everything he is saying. I will though say that I have used his program. It does work and work well, but is not unbootable. I am not saying he says it is or anything of that manner I just want people to be aware that it isnt. His program is a very well written program though and serves its purpose. I will say though his post was a little to in depth for the average yahoo user to even understand or comprehend. I say this, because in my time on yahoo I have found that the average yahoo users are morons. LOL. Well I have said enough. P.S. I did not write this to in anyway degrade or run down YMLITE or its writer. I was just simply stating FACTS on simpler, but truthful level.
October 3, 2006 at 8:53 pm #152347Torseq Tech.
MemberEven if it was a pitch to get users to use YMLite, which I don’t believe it was, why would that matter? YMLite’s free, it doesn’t cost a penny. There is no “sales pitch” if it’s not being “sold” to begin with.
ultra_great wrote:
Quote:I have just finally recently switched from 56kbps dial up to 3.0mbps DSL. I myself booted more people and better on my old dial up connection.Congratulations on beating the odds.
October 4, 2006 at 3:20 am #152362ultra_great
MemberI didnt say there was anything wrong with it….Did I ? NO …..didnt think so. I dont have nothing against that but what i do have something agaist is peeps editing out my signature and my MY WEB LINK after I was kind enough to add the link to all this on my site so my members start coming here. Whats up with that?
Well Now I See Why Cause They Block It. Now Taht Is Cheap
October 4, 2006 at 3:28 am #152337Nessa
Participantultra_great;208428 wrote:I didnt say there was anything wrong with it….Did I ? NO …..didnt think so. I dont have nothing against that but what i do have something agaist is peeps editing out my signature and my MY WEB LINK after I was kind enough to add the link to all this on my site so my members start coming here. Whats up with that?Well Now I See Why Cause They Block It. Now Taht Is Cheap
I sent you a private message as to why your link was removed. Please refrain from posting it again as it takes people to booters which BigBlueBall does not condone, regardless of it being your site.
October 4, 2006 at 3:35 am #152363ultra_great
Memberyeah i can understand that. i do apologize for that. but do not doubt who i am. like you wil read in yer email dont play me like that. i didnt come in here talking sh*t on you. please dont do it on me.
well i understand about my link but why not my signature? why cant i post it? they shouldnt see it as a link.
-
AuthorPosts
- The topic ‘How Yahoo booters *REALLY* work.’ is closed to new replies.