Jump to content

Talk:DCC SEND exploit

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Illegal hack

So an incredibly easy-to-use and still illegal hack is being displayed here? That's great. -Valdrone (talk) 20:34, 21 November 2007 (UTC)[reply]
I think its important that newbies know about this stuff. It hardly effects anyone any more - most users have updated their router firmware --84.70.199.89 (talk) 21:27, 24 November 2007 (UTC)[reply]

Update?

I was recently testing out this exploit (with the permission of the person being tested on, of course) to see what exactly matches. I found out that it's not "DCC SEND [character argument]". In fact, the trigger is better described with the following regular expression:

DCC (SEND|CHAT) \S{5}.{9}

In other words, it must include "DCC" followed by a single space, then either "SEND" or "CHAT" followed by another space. Then, it must be followed by 5 non-space characters and then nine characters, which may or may not be spaces. Note that this text may appear anywhere in the line.—Iggy Koopa (talk) 00:44, 14 December 2007 (UTC)[reply]