PDA

View Full Version : Invites generator



johny1
01-01-2009, 06:34 PM
I am not endorsing or encouraging this, I am just curious as to why no one has created some sort of program that creates invites for private trackers? (considering people's obsession) Something that spites out invites like a keygenerator or something.

meelad
01-01-2009, 06:36 PM
good idea. :D

KushBlow
01-01-2009, 06:40 PM
Probably because it's impossible...?

GuitarLegend
01-01-2009, 06:46 PM
i think it's possible...but you have to know well the source code of the tracker

johny1
01-01-2009, 06:53 PM
It has been created, as a matter of fact i am the creator but i charge $10,000 for this program.:lol::lol::lol:

:lol: Such a generator doesn't require that much skill to cost $10,000


good idea. :D

Thank you.


Probably because it's impossible...?

I don't think its impossible but it might be a little difficult.

cinephilia
01-01-2009, 07:10 PM
http://www.embacubalebanon.com/images/che032.jpg

LJ.
01-01-2009, 07:14 PM
It has been created, as a matter of fact i am the creator but i charge $10,000 for this program.:lol::lol::lol:

cool, pm me your paypal mail :w00t:

johny1
01-01-2009, 07:15 PM
http://www.embacubalebanon.com/images/che032.jpg


Relevance to thread?

sheriff 01
01-01-2009, 07:16 PM
There is no relevance, thats just a picture of cinephilia having a bad day!

johny1
01-01-2009, 07:21 PM
It would cheaper to hire a programmer from India to do it than pay $10,000. :lol: I bet they would do a good job too.

Swift
01-01-2009, 07:36 PM
not gonna happen ...

monk3y
01-01-2009, 07:43 PM
good luck.

i would like an invite to paypal tracker with 100,000$ buffer. can do ?

kj0r
01-01-2009, 07:44 PM
it's too difficult because each tracker has unique method to generate codes which have a lots of letters and numbers

johny1
01-01-2009, 07:55 PM
not gonna happen ...

It might happen

hagckz0r
01-01-2009, 07:59 PM
I don't think it is impossible but it is very hard to build up such a program ;.

lysine
01-01-2009, 08:00 PM
unless you hack the mysql database, it's not going to happen. just entering random codes in hopes that one will work is an exercise in futility.

johny1
01-01-2009, 08:10 PM
unless you hack the mysql database, it's not going to happen. just entering random codes in hopes that one will work is an exercise in futility.

Random codes might just do it.

Cheeseman1208
01-01-2009, 08:10 PM
unless you hack the mysql database, it's not going to happen. just entering random codes in hopes that one will work is an exercise in futility.
Exactly. Someone generates an invite code, which is then stored in the MYSQL database until it is deleted after 48 hours to a week (depending on how long the invite code lasts). The key generator would have to know EXACTLY which codes are currently in the MYSQL database, which is impossible without access to it. Even if you made a script that brute forced the site with every invite code possible, it would take years (even centuries) to see a result. Not to mention that you would be stealing an invite from someone else, and the guy who generated the invite code would probably get suspicious that someone other than the person he invited is on his referral tree.

mrunal
01-01-2009, 08:12 PM
why i never got the idea?

Nice idea though.I think we ll have to hire coders from razor team or any other scene team if they can crack games from multimillion dollar firms than it should be piece of cake for them to crack this one.

johny1
01-01-2009, 08:14 PM
why i never got the idea?

Nice idea though.I think we ll have to hire coders from razor team or any other scene team if they can crack games from multimillion dollar firms than it should be piece of cake for them to crack this one.

Exactly.

cinephilia
01-01-2009, 08:39 PM
why i never got the idea?

Nice idea though.I think we ll have to hire coders from razor team or any other scene team if they can crack games from multimillion dollar firms than it should be piece of cake for them to crack this one.

Exactly.
there's nothing comparable in your example...
keep living in your world of illusion.

pone44
01-01-2009, 08:47 PM
You should earn your invites by your activity on your sites/forums, such as Fst and your tracker forums. That is cutting corners, a invite generator. Would get banned quick i would think.:blow:

johny1
01-01-2009, 09:04 PM
Exactly.
there's nothing comparable in your example...
keep living in your world of illusion.

All I am saying is such a program is not impossible.


You should earn your invites by your activity on your sites/forums, such as Fst and your tracker forums. That is cutting corners, a invite generator. Would get banned quick i would think.:blow:

The point of such program is to invite yourself instead of waiting for an invite than maintaining a ratio.

TheFoX
01-01-2009, 09:23 PM
And how would such a program get past a system whereby the inviter needs to verify the invitee after activating the invite.

There is a world of difference between reverse engineering a program, which is there to be dissected, and a custom invite script, which is out of reach. The only way to decide whether a system can be bypassed is by having a working copy of that system to test. No system. No results.

teresckova
01-01-2009, 09:26 PM
did u saw the last night tv show called star trek...it has the same ideea
not gonna happen:impossible

johny1
01-01-2009, 09:29 PM
According, to someone this is pretty simple. You just have to find out how each individual tracker generates its invites. After knowing that...it gets easier.

benficao
01-01-2009, 09:33 PM
everyone, has tought about it, but u said it out loud :-)

it an interesting topic thats for sure, maybe someone has done it, but if he did, i bet he would never share it whit the world.

ghurka
01-01-2009, 09:35 PM
According, to someone this is pretty simple. You just have to find out how each individual tracker generates its invites. After knowing that...it gets easier.Yeah and go crush a lump of coal in your hand and you'll soon have a diamond.

Scenic
01-01-2009, 09:35 PM
The idiocy in this thread is astounding. Maybe learn something about how invite systems work before assuming that a keygen is even remotely possible.

Brenya
01-01-2009, 09:36 PM
unless you hack the mysql database, it's not going to happen. just entering random codes in hopes that one will work is an exercise in futility.
Exactly. Someone generates an invite code, which is then stored in the MYSQL database until it is deleted after 48 hours to a week (depending on how long the invite code lasts). The key generator would have to know EXACTLY which codes are currently in the MYSQL database, which is impossible without access to it. Even if you made a script that brute forced the site with every invite code possible, it would take years (even centuries) to see a result. Not to mention that you would be stealing an invite from someone else, and the guy who generated the invite code would probably get suspicious that someone other than the person he invited is on his referral tree.
Exactly. Let's say an invite code is only 16 characters longs, and composed of only lower-cased alphanumeric characters. The number of permutations is: n! / (n - k)! = (26 + 10)! / (26 + 10 - 16)! = 36! / 20! = 3.71993326789901217468e41 / 2.43290200817664e18 = 152901072685905223680000 permutations.

cinephilia
01-01-2009, 09:56 PM
Exactly. Let's say an invite code is only 16 characters longs, and composed of only lower-cased alphanumeric characters. The number of permutations is: n! / (n - k)! = (26 + 10)! / (26 + 10 - 16)! = 36! / 20! = 3.71993326789901217468e41 / 2.43290200817664e18 = 152901072685905223680000 permutations.
your post made them stfu :yup:
thanks.

DanielleD87
01-01-2009, 10:05 PM
there is a difference between hacking and cracking. getting into someones SQL database is hacking. writing a keygen for software is cracking. you guys are getting the two mixed up.

hacking and cracking are night and day too. hacking involves finding a vulnerability aka an exploit and using it to your advantage. it is finding a hole. cracking is just looking through assem, seeing how a program works, and then either altering the code so it does what you want it to (easy) or reversing the code to make a keygen (harder).

cracking has nothing to do with hacking it is night and day.

Brenya
01-01-2009, 10:21 PM
cracking has nothing to do with hacking it is night and day.
i've always thought of cracking as malicious hacking.

pentomato
01-01-2009, 10:21 PM
Just create a virus, one that evolves itself and nothing can find it, and then as a trojan gets there and makes the tracker give you an invite and disapairs after the job is done.

Artemis
01-01-2009, 10:56 PM
And how would such a program get past a system whereby the inviter needs to verify the invitee after activating the invite.

There is a world of difference between reverse engineering a program, which is there to be dissected, and a custom invite script, which is out of reach. The only way to decide whether a system can be bypassed is by having a working copy of that system to test. No system. No results.

The only post you should really take note of, since it from a coder that has designed the code for such systems and one of the major contributors to TBDev.

waffles_jd
01-01-2009, 11:11 PM
A keygen works by attacking a hash based system, one where the keys aren't stored in the program. This is why many programs started using activation systems as well. However, few companies tie the activation system into the list of keys actually sold. If they did, keygens would no longer work. Most private trackers do not use hash based systems, but rather generated and stored keys, which cannot be guessed outside of brute forcing. Our site's code allows for 6277101735386680763835789423207666416102355444464034512896 combinations, literally, of which only 200-1000 are active at any time. To be able to pick one of the 1000 out of that many possible combinations in a week time window is impossible. Time will end before technology to handle that kind of work exists.

BlackBird_
01-02-2009, 01:25 AM
OMFG, c'mon people, get a life... life is much more than private trackers...:yup:

TheFoX
01-02-2009, 01:28 AM
Time will end before technology to handle that kind of work exists.

While the majority of your post is correct, that last statement isn't.

I can remember when it took a day to generate the mandelbrot set, yet a modern PC can generate the same set in less than one second.

The simple fact is that encryption today will become useless tomorrow. New methods of encryption have to be developed to keep up with processing power.

I have also been a member of the Distributed Net projects, and have seen how these decryption problems have got tougher due to newer, and faster, processors powering our machines. When I first joined, they were doing simple md5 algorithms, but nowadays they are hitting much more complicated routines.

The simple fact is that something that could take several years today, make only take several weeks in a few years time, or even days, or hours.

In response to what a lot of people have said, about brute forcing, if an invite requires the inviter to verify, then brute forcing is null. It's like picking a lock, only to find the family home.

That1Guy
01-02-2009, 01:40 AM
And how would such a program get past a system whereby the inviter needs to verify the invitee after activating the invite.

There is a world of difference between reverse engineering a program, which is there to be dissected, and a custom invite script, which is out of reach. The only way to decide whether a system can be bypassed is by having a working copy of that system to test. No system. No results.

The only post you should really take note of, since it from a coder that has designed the code for such systems and one of the major contributors to TBDev.

Reading through the thread, I was hoping I would find a post by TheFoX. Honestly, he knows what he is talking about...

waffles_jd
01-02-2009, 02:08 AM
Time will end before technology to handle that kind of work exists.

While the majority of your post is correct, that last statement isn't.

I can remember when it took a day to generate the mandelbrot set, yet a modern PC can generate the same set in less than one second.

The simple fact is that encryption today will become useless tomorrow. New methods of encryption have to be developed to keep up with processing power.

I have also been a member of the Distributed Net projects, and have seen how these decryption problems have got tougher due to newer, and faster, processors powering our machines. When I first joined, they were doing simple md5 algorithms, but nowadays they are hitting much more complicated routines.

The simple fact is that something that could take several years today, make only take several weeks in a few years time, or even days, or hours.

In response to what a lot of people have said, about brute forcing, if an invite requires the inviter to verify, then brute forcing is null. It's like picking a lock, only to find the family home.

Actually, it's not anything related to encryption. It's two people (the bad guy and the site) picking from a set of random numbers 6x10^57 (or so) strong and hoping to get a match in the same rolling week. Even if we completely ignore the fact that any admin would pick up on the attempts after awhile, it's still essentially impossible for it to happen.

Gekko
01-02-2009, 02:14 AM
OMFG, c'mon people, get a life... life is much more than private trackers...:yup:

not true

pro267
01-02-2009, 03:10 AM
there is a difference between hacking and cracking. getting into someones SQL database is hacking. writing a keygen for software is cracking. you guys are getting the two mixed up.

hacking and cracking are night and day too. hacking involves finding a vulnerability aka an exploit and using it to your advantage. it is finding a hole. cracking is just looking through assem, seeing how a program works, and then either altering the code so it does what you want it to (easy) or reversing the code to make a keygen (harder).

cracking has nothing to do with hacking it is night and day.
No quite, although many make the same mistake you've made.

The actions of hacking and cracking are basically the same thing, which is finding a vulunerability in a certain system. The different is in the intent and subsequent actions after revealing the vulunerability. A hacker approaches hacking with curiosity and/or wishes to learn or educate, while a cracker wishes to harm or take advantage of something. Since both may perform the same action (at the initial stages of hacking/cracking), you might wonder what's the difference anyway? Well there is difference; a fine yet important one nonetheless.

To illustrate the difference, let's consider a guy who found a vulunerability in a switching system of a major telephone company. The guy could go both ways: if he refrains from taking advantage of it and/or notifies the company, then his action would constitute as "hacking". If he keeps the information to himself or his close contacts, and takes advantage of it, then his action would be considered as "cracking".

A person writing a code to override the copyright protection of a software, and distributes it, is usually considered a cracker. Not only did the cracker have no intention of notifying the developers of the vulunerability, but in fact he facilitated people exploiting it at a massive scale. That's why the majority of groups who participate in such activities are considered cracking groups, and not hacking groups. With time and the widening of the phenomena, the word cracking has become synonymous with that sort of activity, which explains why you've made the mistake yourself.

As for the idea of remote generation of invite codes, it is a complete and utter nonsense. In most cases, people who say that have no idea as to what they're talking about. For one thing, to generate the code and add it to the database, one would need access to the database, which is (or should be) locked to a certain workstation only, most usually localhost. They would then need to gain access to that machine, which means going past various filtering mechanisms. Finally, if he does gets access to a terminal with network access to the database, he would have to crack his way into the database without having a working account on it. Frankly, getting an invite to TTC would probably be easier than that.. They could ofc try to inject some code to the database through other means, but that would involve some application on the server not being secure enough, and frankly if that's the case he could do a lot worse than generate a new invite code.

Having said all that, the only remaining way would be guessing a valid invite code. With a standard 32bit MD5 digest, and assuming one would have to cover 50% of these options in average to guess the correct combination, we're talking about 2147483648 different options. ofc, if there are several invite codes floating around and the hashing function is uniform, it'll take a lot less than that (in average, the reduction would be proportional to the number of invite codes valid at any given time).

If you take into account the various packet header overheads, network and processing congestions, bandwitdth etc. that would make such an attack pretty hard, especially if the number of registration attempts per each IP is limited.

If a site uses a standard SHA1 digest, however, we're talking about a field of 2^160, which would reduce the feasibility of such an attack to 1/2^(not_gonna_happen)..

There are ways to reduce the number of options substantially but I'm certainly not going to discuss them here :-P

(Wow, that was a longer post than I had intended it to be..)

Brenya
01-02-2009, 05:28 AM
In response to what a lot of people have said, about brute forcing, if an invite requires the inviter to verify, then brute forcing is null. It's like picking a lock, only to find the family home.
How does the inviter verify the invite?

meelad
01-02-2009, 05:42 AM
On some sites like iplay, you need to verify the invite by clicking somewhere.. Then only the invitee's account is activated.

Sanka113
01-02-2009, 05:43 AM
By asking them what their email is.

Albo Da Kid
01-02-2009, 05:54 AM
Congratulations:lol:

You have all been suckered into an idiotic topic once again.

sheriff 01
01-02-2009, 06:24 AM
Congratulations:lol:

You have all been suckered into an idiotic topic once again.

How did i get sucked in? I am the one selling the program!:drunk:

interwebz
01-02-2009, 07:10 AM
thank you, we're now all just a little dumber for even seeing this thread.

cousspized
01-02-2009, 07:23 AM
owner will change it if it's hacked

yayyyyyy
01-02-2009, 03:23 PM
i think it's possible...but you have to know well the source code of the tracker

it's IMPOSSIBLE.

invites are generated when you click on SEND... and to verify if an invite is valid the site checks if it has been generated...

you cannot create a working keygen as there's absolutely no mathematical algorith to be reversed...

otherwise wouldn't you think all romanian people would be already on SCT+SCC with 100 accounts each one? LOL

monk3y
01-02-2009, 03:50 PM
http://robdamanii.com/macros/you-have-failed-spilled-beer.jpg

Popov
01-02-2009, 03:53 PM
http://robdamanii.com/macros/you-have-failed-spilled-beer.jpg

lol, that made me laugh :lol:

btw, just pay someone in the staff a couples of 1,000 dollars. And you will get every site you want ;)

nthpeter
01-02-2009, 05:16 PM
Have anyone tried brute forcing a torrent tracker so far? It would be easier than hacking an invite.

monk3y
01-02-2009, 05:22 PM
Have anyone tried brute forcing a torrent tracker so far? It would be easier than hacking an invite.

a couple of torrent sites were already brute forced, that's why they inserted the reCaptcha thing. :pinch:

nthpeter
01-02-2009, 05:42 PM
Have anyone tried brute forcing a torrent tracker so far? It would be easier than hacking an invite.

a couple of torrent sites were already brute forced, that's why they inserted the reCaptcha thing. :pinch:

I have a Captcha hacking tool, very useful :naughty:.

Sonnentier
01-02-2009, 07:52 PM
The problem with it is that it's a server-side mechanism. We don't know the state of the server and we can't change it.

Area51
01-02-2009, 09:45 PM
this is a dream .
Anyway , some tracker even they use a code , sometimes the user must be validated from the user that made the invite ... So ... it's hard ...

DV8type
01-02-2009, 11:32 PM
nuuuhuh. i have a MSN friend that has a cousin, who has a sister, who just had a baby who is a 1337 |-|4xXx0rz and wrote a custom script that definitely creates invite codes for any tracker. If you want axx to this PM Artemis as he's the father of the baby :O

Its True!

pro267
01-03-2009, 12:18 AM
PM who?
Oh, you mean Artemis (http://filesharingtalk.com/vb3/private.php?do=newpm&u=168734)?

Oh yeah, gotcha.

roxana231
01-03-2009, 09:23 AM
this is very funny :)

ErdeN
01-03-2009, 12:10 PM
trackers can catch it and ban you immediately

monk3y
01-03-2009, 01:09 PM
a couple of torrent sites were already brute forced, that's why they inserted the recaptcha thing. :pinch:

i have a captcha hacking tool, very useful :naughty:.
:01:

nthpeter
01-03-2009, 03:58 PM
i have a captcha hacking tool, very useful :naughty:.
:01:

I know, im fabolous :D

whip22
01-03-2009, 06:01 PM
nuuuhuh. I have a msn friend that has a cousin, who has a sister, who just had a baby who is a 1337 |-|4xxx0rz and wrote a custom script that definitely creates invite codes for any tracker. If you want axx to this pm artemis as he's the father of the baby :o

its true!
lol

TheFoX
01-04-2009, 02:46 AM
http://robdamanii.com/macros/you-have-failed-spilled-beer.jpg


Well, we all know Chewbacca on the right, but who is the guy of the left? Doesn't look like Han Solo to me!

cinephilia
01-04-2009, 03:34 AM
I am not endorsing or encouraging this, I am just curious as to why no one has created some sort of program that creates invites for private trackers? (considering people's obsession) Something that spites out invites like a keygenerator or something.
http://i44.tinypic.com/15p0nx5.jpg

nbo
01-04-2009, 03:40 AM
I am not endorsing or encouraging this, I am just curious as to why no one has created some sort of program that creates invites for private trackers? (considering people's obsession) Something that spites out invites like a keygenerator or something.
http://i44.tinypic.com/15p0nx5.jpg

i am amazed at the effort you put into some of your posts

cinephilia
01-04-2009, 03:48 AM
i am amazed at the effort you put into some of your posts
you shouldn't.

nbo
01-04-2009, 03:49 AM
i am amazed at the effort you put into some of your posts
you shouldn't.
what do i have to do to get a picture ;)
party on.

cinephilia
01-04-2009, 03:52 AM
you shouldn't.
what do i have to do to get a picture ;)
party on.
you have to use your brain + google :cool:

EstelleD
01-04-2009, 04:44 AM
http://i44.tinypic.com/15p0nx5.jpg
http://pic.ipicture.ru/uploads/090104/ts4gk3eeyH.gif

cibu
01-04-2009, 01:34 PM
if y'all would of read my waffles thread you would have seen that there is a way to get your invites....but i works on only a few trackers..it's sort of like an invite bug

sheriff 01
01-04-2009, 02:23 PM
if y'all would of read my waffles thread you would have seen that there is a way to get your invites....but i works on only a few trackers..it's sort of like an invite bug

What waffles thread? You said you created this thread?

cibu
01-04-2009, 02:48 PM
yeah..i made it but then it got deleted beucase of it's content...:)

viru5
01-04-2009, 03:13 PM
Stop dreaming please :X

johny1
01-04-2009, 07:02 PM
yeah..i made it but then it got deleted beucase of it's content...:)


That's too bad.

Hermiod
01-04-2009, 08:26 PM
Cant create one, invite codes are randomly generated AND stored in a table. So even if you know the code algorythm, you still have a very high number of invite code possibilities. Most trackers will ban your IP after 10 failed attempts.

Alien5
01-04-2009, 09:35 PM
Why has this thread got the best collection of Dodgy Avatars?



can one of you cunts make a prostitute generator? thanks.

KushBlow
01-04-2009, 09:40 PM
can one of you cunts make a prostitute generator? thanks.

That was totally uncalled for. We have children here :).

Alien5
01-04-2009, 10:11 PM
We have children here?

! TRADE !
01-04-2009, 10:23 PM
Stop dreaming please :X


thay's already happend

with iplay and sct

and i talk with the person do that

that's about 10 monthes now

and he sent to me two invites to each site

and i already register

i hope and my dream to know how he do that ?

he told me that he have program do that

any way the both accountes are working till know

cibu
01-04-2009, 11:12 PM
guys anything is possible..and surprisingley not too hard...you just gotta know a few stuff

benficao
01-04-2009, 11:20 PM
i knew it!!!


get the guy some panties from angelina jolie or something, and i bet he will give u the program!

Albo Da Kid
01-04-2009, 11:41 PM
Give it to me. I will pay you 86'000 Ugandan monies >>>>>http://www.youtube.com/watch?v=nuyh90thPGY

gerardkpop
01-04-2009, 11:52 PM
Someone needs to make this NOW! Hahaha

johny1
01-05-2009, 12:07 AM
guys anything is possible..and surprisingley not too hard...you just gotta know a few stuff

True that.

pone44
01-05-2009, 12:45 AM
Invites are to be earned not generated....


You guys do not know what being a private site means. That would defeat the whole invite process. Would be a disaster to Bt.

This whole idea is idiotic and disrespectful to any who would think about using such a thing-would be basically a cheat script to infiltrate sites that obviously do not want you there!If it was possible...



guys anything is possible..and surprisingley not too hard...you just gotta know a few stuff

True that.





http://i44.tinypic.com/15p0nx5.jpg

Nice Pic. I like that one....

We all can not all be like Frodo and Pass through mordor. :D

johny1 was the name johny5 taking already?

silvertec
01-05-2009, 12:50 AM
Seriously this takes the cake
go find some gay porn and disappear
Invite generator to the next galaxy
Is it really that hard to find invites to sites?