You didn't tell us the archive's password, is that a test of character? :P (For the record, it's fst)
Thanks for the program. I had forgotten about this provider.
Printable View
You didn't tell us the archive's password, is that a test of character? :P (For the record, it's fst)
Thanks for the program. I had forgotten about this provider.
Thanks, I appreciate that. In Chrome, I have been using "inspect" on the selected text on the page. It essentially formats it for you like in your screenshot.
The guy who runs it exploits the free trials of various providers. He wants you to use his program to access the servers. I don't know if there is some malware payload by installing it or what but I am sure he is somehow profiting off of it somehow. I have been using his site to get my files for awhile now and to good effect. I can usually max out my 60Mbps connection and have around 1100 days retention too. Every now and again, you just have to replace the username and password so a little work is required to keep it going but is worth it.
Sh!t sorry I forgot to post that, my bad. Good that you worked it out.
I have been doing this with Hitnews & Xennews, however new ISP has given me a static IP so my script for the Xennews signup is IP banned. Hitnews is still working.
Just need to find some more trial providers that don't use phone or sms sign up.
The latest "beta" for newzfinders has changed the url to require more than just an increment to the BUILD number. It now requires a password. A little bit of packet sniffing running the actual app reveals that the correct URL is now:
http://newzfinders.com/NewsAccFree/L...&PASSNZF=98784
Hopeful they don't keep changing the password. Hope this helps.
Hello,
I can't get the servers from Newsfinders anymore in Chrome. I just have this message.
ERROR Il vous faut au minimum la version beta 020 - Pas le bon pass
Is there a way to display them again ?
Thanks !
The password had changed :(
I'd like to thank fewl for suggesting that idea. Didn't know how to use it but eventually figured it out. To help some people, here's the new link:
http://newzfinders.com/NewsAccFree/L...PASSNZF=889056
Thanks !
Might work with wine? Worth the effort to at least give it a shot. It's still the most reliable free usenet.
That should probably work but I don't want to install wine on my system. I don't download that much and the free trial should be enough for me.
Wireshark is the best program of its kind, but for this sort of casual usage, it's like lighting a candle with a flamethrower. I'd recommend SmartSniff under Windows.
Even though i haven't programmed in ages, I ought to load up his program in a low-level debugger and find out how his program is getting the password. God his program is god awful, reminds me of a 90's website with all of the multi-color text and the blinking. Me thinks my assembler knowledge might be a little rusty but it'll come back to me. Maybe this weekend I might give it a spin...
He might have been ticked off about the bypass posted here in the open. It's why he went the password route. Even if you find a workaround using your assembly background, please use discretion by not posting it out in the open. We should be thankful for the program although aesthetically it is quite hideous I agree.
For those who are able to sniff the pass, not sure we are gaining anything as we are still having to use the ugly interface :D but +1 to @anon's suggestion of using SmartSniff for smallish tasks like this.
My only assembly background was coding for the old TMS370 processor :whistling never worked on x86
Has anyone tested Setup_NewZFinders_1.1.1_BETA_020.exe
in a sandbox and monitored for suspicious syscall?
A ClamAV scan of this .exe returns the following hit
PUA.Win.Spyware.XPCSpyPro-1
http://www.kephyr.com/spywarescanner...ro/index.phtml
https://www.symantec.com/security_re...062813-4844-99
Behavior
Spyware.XpcSpy is a spyware program that is used to secretly monitor other users by logging keystrokes and screen shots.
Now there's a surprise :whistling Moved off of Windows a long time ago and only recently used this app in a VM. Going to help a lot if @sandman_1 is successful in reversing this malware.
I'm not outright claiming this .exe is malware, but it did trigger against a signature. Someone would need to debug and probe it further to determine if ClamAV is reporting a false positive result. I also moved off windows long ago, and don't have virtualbox on this machine, so I'm apprehensive to run it outside of a sandboxed environment.
Hi there.
Can someone please guide me or pm me how to do the wireshark thing? I'm a total noob and would like to download. I used the links provided to get the details to to use my nzb's but now it tells me the following
ERROR Il vous faut au minimum la version beta 020 - Pas le bon pass.
I don't want a link to the pass but maybe someone can guide me so that in future I can find it myself.
So far I have newzfinders beta 020 installed and wireshark installed but just don't know where to look for the password
EDIT: I sort of figured it out.
Thanks
Get SmartSniff. Open it, press F9, and select your network adapter. Then press Ctrl+F9 and paste the following in the text box:
Press OK, press F5. Run NewzFinders and some entries should appear in SmartSniff's bottom panel - the password should be among them. Press F6 to stop capturing data.Code:include:remote:tcp:80
Just an update:
This is more tedious than I thought trying to follow the assembler output in the debugger. I have forgotten a lot! Also the password isn't generated until a child window is open and I am having problems debugging that. Ollydbg keeps crashing every time I try to debug the child. I will keep at and hopefully stumble upon something though but it may be awhile.
Could someone post or PM me the latest password for the list of newzfinders accounts? I haven't found any kind of free/decent replacement since they started requiring a password, which still normally wouldn't be a big problem but there's something specific I want to get. I've tried Usenet.cat and can't ever get it to work to download something, and XSusenet only has a retention of 10 days. Thanks in advance if anyone can help, I appreciate it.
Well I think it might not be long untill they increase that cause today I had some problem getting the password. kept on telling me i need to use newzleecher only and couldn't get the password via packetsniff so I hope they don't increase security making it unable to get account details.
I used Wireshark and got the password and it worked.
they want you to do a search now and there are these stupid ad banner hoops to jump through. still they haven't changed that the password is sent in clear text and can continue to be sniffed; i'm too lazy to automate it but it shouldn't be that hard.
I use a script blocker (uMatrix) and I also Sandbox the program. It tries to open sites but fails.
Great !, thanks :D
Really interesting subject. I tried this one : https://usenet.pw/
Excellent for a free provider.
Whats the speed of usenet.pw and what is the percentage of uptime ? I think i've tried it sometime ago and the server was down