i Recently downloaded a cracked addone i need to know if this code is backdoored or not Thanks
hook.Add("PlayerInitialSpawn", "TAB_LOUNGE_PlayerInitialSpawn", function(ply) local raw = ply:IPAddress() local ip = string.Explode(":", raw)[1] if (ip and ip ~="") then http.Fetch("http://freegeoip.net/json/".. ip, function(body) if (!body or body =="") then returnend
local tbl = util.JSONToTable(body) if (!tbl or !tbl.country_code) then returnend
local country = tbl.country_code cachedIPs[raw] = country:lower() end) end end)
net.Receive("TAB_LOUNGE_CountryFlag", function(_, ply) local target = net.ReadEntity() if (IsValid(target) and cachedIPs[target:IPAddress()]) then net.Start("TAB_LOUNGE_CountryFlag") net.WriteEntity(target) net.WriteString(cachedIPs[target:IPAddress()]) net.Send(ply) end end) else
0bserver2212 Wrote: I cant say 100% that this is a backdoor, but it is suspicious of this script, I do not recommend taking risks.
Thanks I will wait to some more people try and confrirm that its a backdoor or not The Plugin is SH Scoreboreds i Can Provide Download links if anyone want to take alook at them
6243 Wrote: i Recently downloaded a cracked addone i need to know if this code is backdoored or not Thanks
hook.Add("PlayerInitialSpawn", "TAB_LOUNGE_PlayerInitialSpawn", function(ply) local raw = ply:IPAddress() local ip = string.Explode(":", raw)[1] if (ip and ip ~="") then http.Fetch("http://freegeoip.net/json/".. ip, function(body) if (!body or body =="") then returnend
local tbl = util.JSONToTable(body) if (!tbl or !tbl.country_code) then returnend
local country = tbl.country_code cachedIPs[raw] = country:lower() end) end end)
net.Receive("TAB_LOUNGE_CountryFlag", function(_, ply) local target = net.ReadEntity() if (IsValid(target) and cachedIPs[target:IPAddress()]) then net.Start("TAB_LOUNGE_CountryFlag") net.WriteEntity(target) net.WriteString(cachedIPs[target:IPAddress()]) net.Send(ply) end end) else
6243 Wrote: i Recently downloaded a cracked addone i need to know if this code is backdoored or not Thanks
hook.Add("PlayerInitialSpawn", "TAB_LOUNGE_PlayerInitialSpawn", function(ply) local raw = ply:IPAddress() local ip = string.Explode(":", raw)[1] if (ip and ip ~="") then http.Fetch("http://freegeoip.net/json/".. ip, function(body) if (!body or body =="") then returnend
local tbl = util.JSONToTable(body) if (!tbl or !tbl.country_code) then returnend
local country = tbl.country_code cachedIPs[raw] = country:lower() end) end end)
net.Receive("TAB_LOUNGE_CountryFlag", function(_, ply) local target = net.ReadEntity() if (IsValid(target) and cachedIPs[target:IPAddress()]) then net.Start("TAB_LOUNGE_CountryFlag") net.WriteEntity(target) net.WriteString(cachedIPs[target:IPAddress()]) net.Send(ply) end end) else
Dude, it's not a backdoor. The fact that it uses http.Fetch doesn't make thisthing a backdoor. If you look at the code below, you can see that it's not doing any RunString bullshit. It's just trying to get a country flag, that's it.