Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- (14:53:10) cipherphunks@exploit.im/exploit.im: hi
- (15:27:18) efimero@exploit.im/4743846181557824656952378: hii
- (15:27:21) efimero@exploit.im/4743846181557824656952378: finally
- (15:27:25) efimero@exploit.im/4743846181557824656952378: sorry i wasnt here
- (15:27:27) efimero@exploit.im/4743846181557824656952378: you up?
- (15:29:34) efimero@exploit.im/4743846181557824656952378: once you connect pls send me example of attack task settings so i can use
- (15:29:36) efimero@exploit.im/4743846181557824656952378: and i want bots
- (19:49:32) cipherphunks@exploit.im/exploit.im: here
- (19:49:32) cipherphunks@exploit.im/exploit.im: ?
- (19:58:15) cipherphunks@exploit.im/exploit.im: hello
- (19:58:15) cipherphunks@exploit.im/exploit.im: ?
- (19:59:53) cipherphunks@exploit.im/exploit.im: naruhito@xmpp.jp
- (19:59:58) cipherphunks@exploit.im/exploit.im: you can buy loads from this guy
- (20:00:05) efimero@exploit.im/4743846181557824656952378: yes
- (20:00:07) efimero@exploit.im/4743846181557824656952378: im here
- (20:00:08) efimero@exploit.im/4743846181557824656952378: finally
- (20:00:11) efimero@exploit.im/4743846181557824656952378: ok please
- (20:00:12) efimero@exploit.im/4743846181557824656952378: PLEASE
- (20:00:15) efimero@exploit.im/4743846181557824656952378: tell me how to attack
- (20:00:18) efimero@exploit.im/4743846181557824656952378: and ok ill write him
- (20:00:22) efimero@exploit.im/4743846181557824656952378: but tell me the attack syntax
- (20:00:26) efimero@exploit.im/4743846181557824656952378: else i cant use for shit
- (20:00:47) cipherphunks@exploit.im/exploit.im: Yeah
- (20:00:48) cipherphunks@exploit.im/exploit.im: so
- (20:00:53) cipherphunks@exploit.im/exploit.im: give me 1 min
- (20:00:57) efimero@exploit.im/4743846181557824656952378: ok
- (20:01:03) efimero@exploit.im/4743846181557824656952378: just send me screen of full attack settings
- (20:01:08) efimero@exploit.im/4743846181557824656952378: so i understand
- (20:01:41) cipherphunks@exploit.im/exploit.im: yes
- (20:01:46) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0gg
- (20:02:05) efimero@exploit.im/4743846181557824656952378: yeah that part i got it
- (20:02:08) efimero@exploit.im/4743846181557824656952378: i need the stuff in tuhe right
- (20:02:12) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0kt
- (20:02:24) efimero@exploit.im/4743846181557824656952378: and for more complex attacks?
- (20:02:29) efimero@exploit.im/4743846181557824656952378: no http:// https:?/?
- (20:03:03) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0u4
- (20:03:24) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0xw
- (20:04:04) efimero@exploit.im/4743846181557824656952378: ty
- (20:04:19) cipherphunks@exploit.im/exploit.im: for https
- (20:04:22) cipherphunks@exploit.im/exploit.im: turn on ssl
- (20:04:23) cipherphunks@exploit.im/exploit.im: and
- (20:04:27) cipherphunks@exploit.im/exploit.im: set port to 443
- (20:04:31) cipherphunks@exploit.im/exploit.im: in the host
- (20:04:34) cipherphunks@exploit.im/exploit.im: only domain or IP
- (20:04:36) cipherphunks@exploit.im/exploit.im: like
- (20:04:40) cipherphunks@exploit.im/exploit.im: google.com
- (20:04:44) efimero@exploit.im/4743846181557824656952378: ok understood
- (20:04:45) cipherphunks@exploit.im/exploit.im: no http://google.com
- (20:04:48) efimero@exploit.im/4743846181557824656952378: thats why mine not worked
- (20:04:48) cipherphunks@exploit.im/exploit.im: if the domain has www
- (20:04:49) efimero@exploit.im/4743846181557824656952378: yeah
- (20:04:51) efimero@exploit.im/4743846181557824656952378: ok ill test
- (20:04:53) cipherphunks@exploit.im/exploit.im: then add www.google.com
- (20:04:53) efimero@exploit.im/4743846181557824656952378: my korean friend
- (20:04:56) efimero@exploit.im/4743846181557824656952378: was annoying me so badly
- (20:05:04) cipherphunks@exploit.im/exploit.im: 'friend'
- (20:05:05) efimero@exploit.im/4743846181557824656952378: bc he thought i wasnt telling him how to use it
- (20:05:13) efimero@exploit.im/4743846181557824656952378: yeah he is my friend i kinda like him but he very impatient
- (20:05:15) efimero@exploit.im/4743846181557824656952378: ok need to test
- (20:05:35) cipherphunks@exploit.im/exploit.im: stop at error codes
- (20:05:37) cipherphunks@exploit.im/exploit.im: 503,502,529;6000
- (20:05:47) cipherphunks@exploit.im/exploit.im: so if the site shows some http response error code
- (20:05:52) cipherphunks@exploit.im/exploit.im: 503 or 502 or 529
- (20:05:54) efimero@exploit.im/4743846181557824656952378: yeah i get it :P
- (20:06:03) cipherphunks@exploit.im/exploit.im: the bot will stop attack for 6000 milliseconds
- (20:06:12) cipherphunks@exploit.im/exploit.im: pulse wave is
- (20:06:14) cipherphunks@exploit.im/exploit.im: 60;1
- (20:06:19) cipherphunks@exploit.im/exploit.im: so it will attack for 60 seconds
- (20:06:24) cipherphunks@exploit.im/exploit.im: then pause attack for 1 second
- (20:06:29) cipherphunks@exploit.im/exploit.im: then attack again for 60 seconds
- (20:06:34) efimero@exploit.im/4743846181557824656952378: got it
- (20:06:36) efimero@exploit.im/4743846181557824656952378: i will test now
- (20:09:08) efimero@exploit.im/4743846181557824656952378: mmm not working maybe im doing something wrong
- (20:09:11) efimero@exploit.im/4743846181557824656952378: method fastddos works?
- (20:09:30) efimero@exploit.im/4743846181557824656952378: mow i see a spike no sure if its mine, its low af
- (20:09:41) cipherphunks@exploit.im/exploit.im: wait
- (20:09:46) efimero@exploit.im/4743846181557824656952378: yeah botnet dstat shows nothing
- (20:09:50) cipherphunks@exploit.im/exploit.im: wait
- (20:09:59) cipherphunks@exploit.im/exploit.im: your knock time is 200 seconds
- (20:10:07) cipherphunks@exploit.im/exploit.im: that means all bots will take command in 200 seconds
- (20:10:08) cipherphunks@exploit.im/exploit.im: then
- (20:10:18) cipherphunks@exploit.im/exploit.im: your max wait time is 60 seconds
- (20:10:28) efimero@exploit.im/4743846181557824656952378: understood
- (20:10:29) efimero@exploit.im/4743846181557824656952378: so takes
- (20:10:32) efimero@exploit.im/4743846181557824656952378: 260s to launch?
- (20:10:32) cipherphunks@exploit.im/exploit.im: that is to bypass any JS/COokie based chalanges
- (20:10:44) cipherphunks@exploit.im/exploit.im: you enabled pulse wave
- (20:10:44) cipherphunks@exploit.im/exploit.im: ?
- (20:10:57) efimero@exploit.im/4743846181557824656952378: wym? no i was using fastddos
- (20:11:14) cipherphunks@exploit.im/exploit.im: give me
- (20:11:17) cipherphunks@exploit.im/exploit.im: your credentials
- (20:11:19) efimero@exploit.im/4743846181557824656952378: sec
- (20:11:20) cipherphunks@exploit.im/exploit.im: I do an attack
- (20:11:23) efimero@exploit.im/4743846181557824656952378: http://46.17.40.83/abc/bt/dashboard.php lmaoice asdsadasdasdas78asd8av5z7xc
- (20:11:24) efimero@exploit.im/4743846181557824656952378: ty
- (20:12:01) cipherphunks@exploit.im/exploit.im: where you want to attack
- (20:12:02) cipherphunks@exploit.im/exploit.im: ?
- (20:12:08) efimero@exploit.im/4743846181557824656952378: any dstat
- (20:12:09) efimero@exploit.im/4743846181557824656952378: sec
- (20:13:01) efimero@exploit.im/4743846181557824656952378: 66.228.50.8
- (20:13:03) efimero@exploit.im/4743846181557824656952378: http://66.228.50.8/
- (20:13:15) cipherphunks@exploit.im/exploit.im: Fast DDOS sends only
- (20:13:19) cipherphunks@exploit.im/exploit.im: GET / HTTP/1.1
- (20:13:31) cipherphunks@exploit.im/exploit.im: so many dstat's may not be able to count them as valid requests
- (20:13:31) efimero@exploit.im/4743846181557824656952378: good for generating a lot of rqps right?
- (20:13:33) efimero@exploit.im/4743846181557824656952378: oh
- (20:13:41) cipherphunks@exploit.im/exploit.im: yeah
- (20:13:48) efimero@exploit.im/4743846181557824656952378: hee what method for requests
- (20:13:52) cipherphunks@exploit.im/exploit.im: where can
- (20:13:52) cipherphunks@exploit.im/exploit.im: I
- (20:13:53) efimero@exploit.im/4743846181557824656952378: like to do the most
- (20:13:56) cipherphunks@exploit.im/exploit.im: see the stat
- (20:13:56) cipherphunks@exploit.im/exploit.im: ?
- (20:14:05) efimero@exploit.im/4743846181557824656952378: vedbex.com/tools/dstat
- (20:14:08) efimero@exploit.im/4743846181557824656952378: the linode one
- (20:17:26) cipherphunks@exploit.im/exploit.im: ok
- (20:17:27) cipherphunks@exploit.im/exploit.im: bro
- (20:17:27) cipherphunks@exploit.im/exploit.im: ?
- (20:17:40) efimero@exploit.im/4743846181557824656952378: yes
- (20:17:41) efimero@exploit.im/4743846181557824656952378: ?
- (20:17:46) cipherphunks@exploit.im/exploit.im: you see
- (20:17:47) cipherphunks@exploit.im/exploit.im: ?
- (20:17:49) cipherphunks@exploit.im/exploit.im: the graph
- (20:17:50) efimero@exploit.im/4743846181557824656952378: oh
- (20:17:50) efimero@exploit.im/4743846181557824656952378: yeag
- (20:17:51) cipherphunks@exploit.im/exploit.im: or not
- (20:17:52) cipherphunks@exploit.im/exploit.im: ?
- (20:17:54) efimero@exploit.im/4743846181557824656952378: wait let me grab the settings
- (20:18:13) efimero@exploit.im/4743846181557824656952378: att_type: HTG
- (20:18:16) efimero@exploit.im/4743846181557824656952378: http get?
- (20:18:25) cipherphunks@exploit.im/exploit.im: yeah
- (20:18:28) efimero@exploit.im/4743846181557824656952378: ok i understand
- (20:18:32) efimero@exploit.im/4743846181557824656952378: so 260s to start?
- (20:18:37) efimero@exploit.im/4743846181557824656952378: damn power stable
- (20:18:40) efimero@exploit.im/4743846181557824656952378: what about the stop?
- (20:18:48) efimero@exploit.im/4743846181557824656952378: like it stops after the specified secs
- (20:18:48) cipherphunks@exploit.im/exploit.im: no
- (20:18:50) efimero@exploit.im/4743846181557824656952378: or need to be deleted
- (20:18:51) cipherphunks@exploit.im/exploit.im: 260s to start
- (20:19:00) cipherphunks@exploit.im/exploit.im: 260s to start in smart mode
- (20:19:03) efimero@exploit.im/4743846181557824656952378: oh
- (20:19:08) efimero@exploit.im/4743846181557824656952378: in non smart its
- (20:19:12) efimero@exploit.im/4743846181557824656952378: instant
- (20:19:14) efimero@exploit.im/4743846181557824656952378: launch?
- (20:19:16) cipherphunks@exploit.im/exploit.im: yeah
- (20:19:19) efimero@exploit.im/4743846181557824656952378: ok
- (20:19:21) efimero@exploit.im/4743846181557824656952378: i test
- (20:19:21) efimero@exploit.im/4743846181557824656952378: sec
- (20:19:24) cipherphunks@exploit.im/exploit.im: 5 second delay
- (20:19:26) cipherphunks@exploit.im/exploit.im: give or take
- (20:20:43) cipherphunks@exploit.im/exploit.im: stop automatic
- (20:20:44) cipherphunks@exploit.im/exploit.im: after
- (20:20:46) cipherphunks@exploit.im/exploit.im: time
- (20:20:47) cipherphunks@exploit.im/exploit.im: or
- (20:20:54) cipherphunks@exploit.im/exploit.im: you can click the pause button
- (20:21:01) efimero@exploit.im/4743846181557824656952378: hee for me its not working idk why i did exact same settings :/
- (20:21:15) cipherphunks@exploit.im/exploit.im: don't believe it
- (20:21:24) cipherphunks@exploit.im/exploit.im: that it's not working with the same settings
- (20:21:41) efimero@exploit.im/4743846181557824656952378: wait i send screen
- (20:22:12) efimero@exploit.im/4743846181557824656952378: https://imgur.com/Jm6UBf5
- (20:22:15) efimero@exploit.im/4743846181557824656952378: am i doing som wrong?
- (20:22:19) efimero@exploit.im/4743846181557824656952378: cuz nothing on dstat
- (20:22:58) cipherphunks@exploit.im/exploit.im: who will add
- (20:23:06) cipherphunks@exploit.im/exploit.im: / in front of HIT
- (20:23:06) cipherphunks@exploit.im/exploit.im: ?
- (20:23:12) efimero@exploit.im/4743846181557824656952378: oh
- (20:23:14) efimero@exploit.im/4743846181557824656952378: good point
- (20:23:18) cipherphunks@exploit.im/exploit.im: yeah
- (20:23:19) cipherphunks@exploit.im/exploit.im: :)
- (20:23:50) efimero@exploit.im/4743846181557824656952378: does it go in location form or
- (20:23:52) efimero@exploit.im/4743846181557824656952378: host
- (20:24:19) cipherphunks@exploit.im/exploit.im: in location
- (20:24:34) cipherphunks@exploit.im/exploit.im: you know about virtual hosts
- (20:24:34) cipherphunks@exploit.im/exploit.im: ?
- (20:24:41) efimero@exploit.im/4743846181557824656952378: he like vps?
- (20:24:43) efimero@exploit.im/4743846181557824656952378: or wym
- (20:24:49) cipherphunks@exploit.im/exploit.im: like how cpanel hosts multiple websites
- (20:24:51) cipherphunks@exploit.im/exploit.im: on same IP
- (20:24:51) cipherphunks@exploit.im/exploit.im: ?
- (20:24:55) efimero@exploit.im/4743846181557824656952378: shared hosting yeah
- (20:25:03) cipherphunks@exploit.im/exploit.im: using virtual hosts
- (20:25:05) cipherphunks@exploit.im/exploit.im: so
- (20:25:12) efimero@exploit.im/4743846181557824656952378: yeah of course i do
- (20:25:13) efimero@exploit.im/4743846181557824656952378: why
- (20:25:14) cipherphunks@exploit.im/exploit.im: if you want to attack something like that
- (20:25:18) cipherphunks@exploit.im/exploit.im: you can do
- (20:25:26) efimero@exploit.im/4743846181557824656952378: also rip i may be retarded but its not working :(
- (20:25:29) cipherphunks@exploit.im/exploit.im: IP;hostname in
- (20:25:33) cipherphunks@exploit.im/exploit.im: host field
- (20:25:41) cipherphunks@exploit.im/exploit.im: so it becomes
- (20:25:42) efimero@exploit.im/4743846181557824656952378: i usually just hit it l4
- (20:25:50) cipherphunks@exploit.im/exploit.im: 100.100.100.100;google.com
- (20:25:57) cipherphunks@exploit.im/exploit.im: so it will attack 100.100.100.100
- (20:26:02) cipherphunks@exploit.im/exploit.im: with host set to google.com
- (20:26:13) efimero@exploit.im/4743846181557824656952378: damn i understand
- (20:26:15) efimero@exploit.im/4743846181557824656952378: https://imgur.com/xi3Qn2I
- (20:26:20) efimero@exploit.im/4743846181557824656952378: i tried this settings
- (20:26:24) efimero@exploit.im/4743846181557824656952378: https://www.vedbex.com/tools/dstat
- (20:26:26) efimero@exploit.im/4743846181557824656952378: nfoservers
- (20:27:51) cipherphunks@exploit.im/exploit.im: it says
- (20:27:54) cipherphunks@exploit.im/exploit.im: nfo servers at IP
- (20:27:55) cipherphunks@exploit.im/exploit.im: 74.91.123.103
- (20:28:10) efimero@exploit.im/4743846181557824656952378: its the dstat
- (20:28:12) efimero@exploit.im/4743846181557824656952378: wym
- (20:28:15) cipherphunks@exploit.im/exploit.im: and
- (20:28:20) cipherphunks@exploit.im/exploit.im: why is your location empty
- (20:28:21) cipherphunks@exploit.im/exploit.im: ?
- (20:28:30) cipherphunks@exploit.im/exploit.im: it should atleast be /
- (20:28:32) cipherphunks@exploit.im/exploit.im: or it will send
- (20:28:33) efimero@exploit.im/4743846181557824656952378: oh
- (20:28:33) efimero@exploit.im/4743846181557824656952378: ok
- (20:28:34) efimero@exploit.im/4743846181557824656952378: sec
- (20:28:37) cipherphunks@exploit.im/exploit.im: GET HTTP/1.1
- (20:28:41) cipherphunks@exploit.im/exploit.im: nd increase time to
- (20:28:46) cipherphunks@exploit.im/exploit.im: 300 seccs
- (20:29:22) efimero@exploit.im/4743846181557824656952378: hee i think its working
- (20:29:26) cipherphunks@exploit.im/exploit.im: :)
- (20:29:28) efimero@exploit.im/4743846181557824656952378: 3666 rqps
- (20:29:33) efimero@exploit.im/4743846181557824656952378: 5000 now
- (20:29:46) cipherphunks@exploit.im/exploit.im: when you know how to use
- (20:29:52) cipherphunks@exploit.im/exploit.im: Smart attack properly
- (20:29:56) efimero@exploit.im/4743846181557824656952378: yeah i know
- (20:29:58) cipherphunks@exploit.im/exploit.im: you can bypass each and every protection
- (20:29:59) cipherphunks@exploit.im/exploit.im: and modify
- (20:30:00) efimero@exploit.im/4743846181557824656952378: technique is all in layer 7
- (20:30:02) cipherphunks@exploit.im/exploit.im: everything
- (20:30:04) cipherphunks@exploit.im/exploit.im: yeah
- (20:30:09) efimero@exploit.im/4743846181557824656952378: yeah ok im glad its working
- (20:30:10) efimero@exploit.im/4743846181557824656952378: time to feed it
- (20:30:13) efimero@exploit.im/4743846181557824656952378: forgot to ask
- (20:30:15) efimero@exploit.im/4743846181557824656952378: does bin has
- (20:30:16) efimero@exploit.im/4743846181557824656952378: startup
- (20:30:20) cipherphunks@exploit.im/exploit.im: Yeah
- (20:30:21) cipherphunks@exploit.im/exploit.im: everything
- (20:30:21) efimero@exploit.im/4743846181557824656952378: and good persistence?
- (20:30:22) efimero@exploit.im/4743846181557824656952378: ok
- (20:30:32) efimero@exploit.im/4743846181557824656952378: yep 15k rqps its also nfo mitigation
- (20:30:32) efimero@exploit.im/4743846181557824656952378: ok good
- (20:30:44) cipherphunks@exploit.im/exploit.im: also
- (20:30:48) cipherphunks@exploit.im/exploit.im: you added only
- (20:30:49) cipherphunks@exploit.im/exploit.im: 300 seconds
- (20:30:57) cipherphunks@exploit.im/exploit.im: so bots cumalitvely attacked for
- (20:31:01) cipherphunks@exploit.im/exploit.im: 100 seconds
- (20:31:09) efimero@exploit.im/4743846181557824656952378: now 20k
- (20:31:12) cipherphunks@exploit.im/exploit.im: 30k
- (20:31:14) efimero@exploit.im/4743846181557824656952378: 31k
- (20:31:15) efimero@exploit.im/4743846181557824656952378: yes
- (20:31:16) efimero@exploit.im/4743846181557824656952378: lol
- (20:31:21) cipherphunks@exploit.im/exploit.im: good enough
- (20:31:21) cipherphunks@exploit.im/exploit.im: ?
- (20:31:22) efimero@exploit.im/4743846181557824656952378: its as it reachs more bots
- (20:31:23) efimero@exploit.im/4743846181557824656952378: right?
- (20:31:27) efimero@exploit.im/4743846181557824656952378: yeah its not bad
- (20:31:27) cipherphunks@exploit.im/exploit.im: yeah
- (20:31:31) cipherphunks@exploit.im/exploit.im: how was
- (20:31:35) cipherphunks@exploit.im/exploit.im: decualion
- (20:31:35) cipherphunks@exploit.im/exploit.im: ?
- (20:31:55) cipherphunks@exploit.im/exploit.im: 37.5
- (20:32:06) efimero@exploit.im/4743846181557824656952378: not better than this
- (20:32:09) efimero@exploit.im/4743846181557824656952378: but in the other hand was irc
- (20:32:11) efimero@exploit.im/4743846181557824656952378: so i liked more
- (20:32:15) efimero@exploit.im/4743846181557824656952378: easier for api and shi
- (20:32:20) efimero@exploit.im/4743846181557824656952378: more interactive
- (20:32:22) cipherphunks@exploit.im/exploit.im: mind you
- (20:32:24) cipherphunks@exploit.im/exploit.im: you have
- (20:32:27) cipherphunks@exploit.im/exploit.im: 3 ddos tasks running
- (20:32:30) efimero@exploit.im/4743846181557824656952378: rip
- (20:32:33) efimero@exploit.im/4743846181557824656952378: sec
- (20:32:48) cipherphunks@exploit.im/exploit.im: only 1 is adding to the server
- (20:32:55) cipherphunks@exploit.im/exploit.im: and did you stop my task
- (20:33:00) efimero@exploit.im/4743846181557824656952378: i stopped all
- (20:33:00) cipherphunks@exploit.im/exploit.im: the linode one
- (20:33:00) efimero@exploit.im/4743846181557824656952378: yes
- (20:33:02) cipherphunks@exploit.im/exploit.im: or deleted it
- (20:33:02) cipherphunks@exploit.im/exploit.im: ?
- (20:33:04) efimero@exploit.im/4743846181557824656952378: deleted
- (20:33:07) efimero@exploit.im/4743846181557824656952378: ok im glad all works
- (20:33:08) cipherphunks@exploit.im/exploit.im: lool
- (20:33:12) cipherphunks@exploit.im/exploit.im: if you delete
- (20:33:19) cipherphunks@exploit.im/exploit.im: it keeps running until the stop time
- (20:33:21) efimero@exploit.im/4743846181557824656952378: fr? thats retarded
- (20:33:23) efimero@exploit.im/4743846181557824656952378: fuck
- (20:33:24) efimero@exploit.im/4743846181557824656952378: ok
- (20:33:27) cipherphunks@exploit.im/exploit.im: why
- (20:33:28) cipherphunks@exploit.im/exploit.im: ?
- (20:33:29) cipherphunks@exploit.im/exploit.im: o.O
- (20:33:35) cipherphunks@exploit.im/exploit.im: that's why there is a stop
- (20:33:42) cipherphunks@exploit.im/exploit.im: maybe you want to edit settings and all
- (20:33:51) efimero@exploit.im/4743846181557824656952378: i can
- (20:33:51) cipherphunks@exploit.im/exploit.im: so you have had around 4 tasks running
- (20:33:55) efimero@exploit.im/4743846181557824656952378: when i have time
- (20:34:26) cipherphunks@exploit.im/exploit.im: go to tasks and run a stop all
- (20:34:31) cipherphunks@exploit.im/exploit.im: to stop all tasks
- (20:36:21) efimero@exploit.im/4743846181557824656952378: ok ty now have to explain all to korean guy'
- (20:36:37) cipherphunks@exploit.im/exploit.im: good luck I guess
- (20:36:40) cipherphunks@exploit.im/exploit.im: I go to sleep
- (20:36:53) efimero@exploit.im/4743846181557824656952378: gn bro thanks for helping me
- (20:36:56) cipherphunks@exploit.im/exploit.im: also that guy gives bot on panel statisitcs
- (20:36:58) efimero@exploit.im/4743846181557824656952378: u sleep like a beast
- (20:37:00) cipherphunks@exploit.im/exploit.im: like if you buy
- (20:37:04) cipherphunks@exploit.im/exploit.im: 1k bots
- (20:37:11) cipherphunks@exploit.im/exploit.im: it will knock 1k on your panel
- (20:37:19) cipherphunks@exploit.im/exploit.im: I am given antibiotics all day
- (20:37:21) efimero@exploit.im/4743846181557824656952378: the last guy i bought from still owes me like 2k bots :/
- (20:37:25) cipherphunks@exploit.im/exploit.im: what else can you expect
- (20:37:28) efimero@exploit.im/4743846181557824656952378: do they kick?
- (20:37:31) efimero@exploit.im/4743846181557824656952378: FUCK
- (20:37:32) cipherphunks@exploit.im/exploit.im: this guy I know him for a while
- (20:37:33) efimero@exploit.im/4743846181557824656952378: what did i do
- (20:37:35) efimero@exploit.im/4743846181557824656952378: why my rext
- (20:37:38) efimero@exploit.im/4743846181557824656952378: so big
- (20:37:48) efimero@exploit.im/4743846181557824656952378: ok idk fuck
- (20:37:48) cipherphunks@exploit.im/exploit.im: because
- (20:37:50) cipherphunks@exploit.im/exploit.im: of this
- (20:37:56) efimero@exploit.im/4743846181557824656952378: i sound fucking retarded
- (20:37:58) efimero@exploit.im/4743846181557824656952378: how do i change
- (20:37:58) cipherphunks@exploit.im/exploit.im: haha
- (20:38:01) cipherphunks@exploit.im/exploit.im: lool
- (20:38:04) efimero@exploit.im/4743846181557824656952378: ok fixed
- (20:38:07) cipherphunks@exploit.im/exploit.im: it's pretty cool
- (20:38:11) cipherphunks@exploit.im/exploit.im: ok
- (20:38:12) cipherphunks@exploit.im/exploit.im: lmao
- (20:38:22) cipherphunks@exploit.im/exploit.im: so yeah
- (20:38:27) cipherphunks@exploit.im/exploit.im: thos guy's bots kick
- (20:38:37) cipherphunks@exploit.im/exploit.im: and tell him cipher sent you
- (20:38:38) cipherphunks@exploit.im/exploit.im: :)
- (20:42:41) efimero@exploit.im/4743846181557824656952378: he is pushing me to buy more than 1k first
- (20:42:42) efimero@exploit.im/4743846181557824656952378: lmao
- (20:51:53) efimero@exploit.im/4743846181557824656952378: i dont think im using smart properly
- (20:51:55) efimero@exploit.im/4743846181557824656952378: not showing in uam
- (21:25:20) cipherphunks@exploit.im/exploit.im: he needs to run traffic and all
- (21:25:22) cipherphunks@exploit.im/exploit.im: what error
- (21:25:22) cipherphunks@exploit.im/exploit.im: ?
- (21:25:36) efimero@exploit.im/4743846181557824656952378: i dont know smart just not working
- (21:25:41) efimero@exploit.im/4743846181557824656952378: probably something in the settings
- (21:26:06) efimero@exploit.im/4743846181557824656952378: it wont show any rqps in uam
- (21:40:58) efimero@exploit.im/4743846181557824656952378: lmk when you can
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement