Why multircon brute-force method can not crack the password? I set the server password from the two letters and could not break him, but the predictive text anyway.
Joined: 13 Aug 2007 21:44 Posts: 4068 Location: http://aluigi.org
that's the reason, because the quake 3 engine has a limitation that accepts one rcon commands each half second so if you send 10 rcons each second it will ignore 8 of them, and one of them can be the correct password
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot post attachments in this forum