SMJS

706 posts

SMJS banner
SMJS

SMJS

@SMJSGaming

23 | I modify games in my free time. Discord: @smjs

가입일 Şubat 2019
45 팔로잉558 팔로워
고정된 트윗
SMJS
SMJS@SMJSGaming·
GDIntercept is out for most platforms including: - Android (32/64 bit) - Windows - Macbook (M1 chipset)
SMJS tweet media
English
3
8
313
46.1K
SMJS
SMJS@SMJSGaming·
@BeatGTO he still does it so I don't think it's due to finding it too much effort
English
0
0
0
82
SMJS
SMJS@SMJSGaming·
Fun fact about #GeometryDash . In RobTop's eyes it's still called GeometryJump since all endpoints and most methods are prefixed with GJ to this day.
SMJS tweet media
English
6
6
191
7.4K
SMJS
SMJS@SMJSGaming·
@outstreamed_ @BeatGTO Just make it case sensitive and problem solved as long as camelCase and TitleCase is used correctly (it is)
English
0
0
0
27
outstreamed
outstreamed@outstreamed_·
@BeatGTO @SMJSGaming 1. anything that isnt gj as in geometry jump will be replaced too 2. whats the point
English
2
0
4
138
Wylie
Wylie@TheWylieMaster·
@SMJSGaming Bro has begun the path I took 🔥
English
1
0
5
880
SMJS
SMJS@SMJSGaming·
@SixtieTen My DMs on Discord are open?
English
1
0
1
163
SMJS
SMJS@SMJSGaming·
#GeometryDash A data breach was discovered in the GD servers which was likely already known by malicious individuals. This means that your email, IP address, hashed password, messages, private levels and much more has likely been dumped somewhere.
English
86
219
1.8K
139.2K
SMJS
SMJS@SMJSGaming·
@Epixx512 Passwords have been hashed in the DB for quite a while already. However other essential info like the actcod2 (the code you receive via mail when you forgot your pass) isn't meaning that anyone with read access can freely swap passwords if they want to.
English
0
0
6
806
a
a@Epixx512·
@SMJSGaming crazy how up until 2.2, logins were being sent over unencrypted HTTP and password were in PLAINTEXT, UNHASHED
English
1
0
19
2.1K
SMJS
SMJS@SMJSGaming·
@CodrGamer The entire lifespan of GD...
English
0
0
0
517
SMJS
SMJS@SMJSGaming·
@jitlua Incident response wise sadly very little. The hole was patched and that's it even when I pushed rob to announce this. And this injection left behind a small bit of garbage data in the open. That's how we found that we weren't the only ones who used it.
English
0
0
4
954
Chad Hyatt
Chad Hyatt@jitlua·
@SMJSGaming You'd think something would already be known or found by someone else before, but you'd probably be surprised how many times that's not true, even for simple stuff. Do we know if any incident response whatsoever been done on this? What makes you say it was likely already known?
English
1
0
1
1.8K
SMJS
SMJS@SMJSGaming·
@luckylakie_real An overview of the amount of lines (1 line is 1 DB table) where the column userIP exists on (126 in total)
SMJS tweet media
English
0
0
0
94
SMJS
SMJS@SMJSGaming·
@luckylakie_real Well then for you it might be less of a problem but for every action taken with the server the IPv4 associated with the request was stored in the database.
English
1
0
0
87
SMJS
SMJS@SMJSGaming·
@evrglo2 Unless someone has it in their local save (I genuinely doubt it) yes
English
0
0
35
986
SMJS
SMJS@SMJSGaming·
Regarding the recent post I made while I had full access to the DB I looked for Element 111 Rg. It's not there #GeometryDash
English
17
10
266
11.2K
SMJS
SMJS@SMJSGaming·
@WinterDHX @Restoration_Uni Nah that's unrelated they just bruteforce or use leaked passwords from other breaches
English
1
0
21
4.6K
SMJS
SMJS@SMJSGaming·
@ThophGD 1. Yes, if the password complexity in GD is not safe enough to protect against a brute force without restrictions like those imposed on the GD servers. Which is the case now that they might be available locally. 2. Mostly change your pass 3. Sell your data, leak private stuff etc
English
3
0
47
8K
ThophGD
ThophGD@ThophGD·
@SMJSGaming Would be nice if you or someone else answered those questions to make people feel safer! 1. Are our GD accounts in risk of getting hacked? 2. Is there anything that we should do? (changing password etc...) 3. What could people do with the dumped info?
English
2
0
19
8.9K
zohnannor
zohnannor@UncannyInfinity·
@cvsilly_ @SMJSGaming but if your password is simple then it's still a problem. they now can guess a password locally
English
2
0
4
1.8K
SMJS
SMJS@SMJSGaming·
@jojo989_A7_ Yes, all passwords were hashed with bcrypt. A proven 1 way encryption
English
0
0
16
4.5K
jojo989
jojo989@jojo989_A7_·
@SMJSGaming only the hashed password right? i mean stupid ahh question but anyways
English
1
0
5
4.9K
SMJS
SMJS@SMJSGaming·
@hypoorr Most were done by simple brute forcing or using other DB breaches to try repeated passwords. But I already found a few which used a trick to bypass logins altogether
English
0
0
11
9.2K
hypoor
hypoor@hypoorr·
@SMJSGaming is this how so many people are being hacked recently then
English
1
0
0
10.2K
SMJS
SMJS@SMJSGaming·
@ddeaen Yes, it might be as recent as in the past few weeks
English
1
0
34
6.3K
deaen
deaen@ddeaen·
@SMJSGaming is this breach recent? cuz i changed my everything like a week ago
English
1
0
6
6.9K
SMJS
SMJS@SMJSGaming·
@GreenRedGD @wezakune Not really, worst case scenario he fucks it up and accidentally makes it not work properly. But the code is not so legacy that it's impossible to add totp. Infact I've already created an example before
English
0
0
11
366
GreenRedTheKizuner
GreenRedTheKizuner@GreenRedGD·
@wezakune @SMJSGaming The problem with this is that RobTop is stuck with code from a few years ago, so adding a modern security system like 2FA can be very dangerous.
English
1
0
0
369
SMJS
SMJS@SMJSGaming·
@cvsilly_ bcrypt. so it's fine
English
1
0
107
9.5K
๎𝅙
๎𝅙@cvsilly_·
@SMJSGaming knowing robtop the hashes in question are sha-1 without salt.. gulp
English
3
0
44
10.3K