extDB2 Exploit And Why You Should Use SQL_CUSTOM_V2

May 8, 2017 Lystic 0

If you run a Life Server you probably use extDB2. It is a wonderfully optimized and amazingly useful plugin used for Database connectivity. The problem with many life servers is they use SQL_RAW (mode 2), which take a string from SQF and executes it in the mySQL database. This inherently […]

ArmA 3 UI Execution Exploit – In Detail

November 4, 2016 Lystic 2

EDIT: The latest patch (0.66) has fixed these issues. This post should now be used to learn how to better prevent these forms of exploits from appearing in your missions and mods. Now that BI has fixed the issue in its latest Dev Patch I wanted to go over, in […]

Server password bruteforcing

August 27, 2016 Lystic 1

I spent the last two days working on a method for stealing server admin passwords. I figured if I used the altis life database injection that I talked about in my previous post I could inject a server and have the bruteforce run for weeks on end until it finds […]

What do cheaters use on ArmA 3 servers?

August 22, 2016 Lystic 0

This post comes after I asked /r/ArmADev for suggestions and subsequently got down voted to hell for what, in my opinion, is a fair dislike towards me in the community. I will be responding to the suggestion posted by /u/otherworldlyBuffoon Here is the post. So what kind of attacks do […]

Advanced script variable hiding.

July 29, 2016 Lystic 0

I needed to find a new way to hide global variables from being accessed (Or even found for that matter) from threads that are not created by me. This is useful for Anticheats as it allows them to access and modify values from multiple threads without subjecting those values to […]