Once you’ve gained access to the remote console, you can start ‘runcode’ - a base FiveM resource found on almost every single FiveM server. The exploit works as follows first, you gain access to the rcon of the server. Running your FiveM server off of the root(linux) or account within the Administrator localgroup on your windows machine.Bad management of group policy on VPS machines.This is made possible for the following reasons Here’s the issue anyone worth their salt can easily use the tools FiveM has given them to gain access to your virtual machine through Remote Desktop Connection with nothing more than your RCON password. Some owners have put themselves at risk by allowing un-trustworthy folks into their server.cfg files. Quite a few servers well over 100 - some holding a constantly high population, are at risk because the owners have decided to set their rcon password to ‘password’ or similar. ioerror is 'big bad hacker omg ham mafia plz ban him nao - read the post, you’ll be a better person for it… If you don’t have anything nice to say go away, I don’t care if you think. The following is all hypothetical I would never involve myself in this, I am also not recommending you test this yourself - and I am specifically stating that should you try to reproduce the following, your ‘rights’ to technology will probably be revoked.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |