Advertisement
Guest User

fewevw

a guest
May 14th, 2019
286
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.90 KB | None | 0 0
  1. (14:53:10) cipherphunks@exploit.im/exploit.im: hi
  2. (15:27:18) efimero@exploit.im/4743846181557824656952378: hii
  3. (15:27:21) efimero@exploit.im/4743846181557824656952378: finally
  4. (15:27:25) efimero@exploit.im/4743846181557824656952378: sorry i wasnt here
  5. (15:27:27) efimero@exploit.im/4743846181557824656952378: you up?
  6. (15:29:34) efimero@exploit.im/4743846181557824656952378: once you connect pls send me example of attack task settings so i can use
  7. (15:29:36) efimero@exploit.im/4743846181557824656952378: and i want bots
  8. (19:49:32) cipherphunks@exploit.im/exploit.im: here
  9. (19:49:32) cipherphunks@exploit.im/exploit.im: ?
  10. (19:58:15) cipherphunks@exploit.im/exploit.im: hello
  11. (19:58:15) cipherphunks@exploit.im/exploit.im: ?
  12. (19:59:53) cipherphunks@exploit.im/exploit.im: naruhito@xmpp.jp
  13. (19:59:58) cipherphunks@exploit.im/exploit.im: you can buy loads from this guy
  14. (20:00:05) efimero@exploit.im/4743846181557824656952378: yes
  15. (20:00:07) efimero@exploit.im/4743846181557824656952378: im here
  16. (20:00:08) efimero@exploit.im/4743846181557824656952378: finally
  17. (20:00:11) efimero@exploit.im/4743846181557824656952378: ok please
  18. (20:00:12) efimero@exploit.im/4743846181557824656952378: PLEASE
  19. (20:00:15) efimero@exploit.im/4743846181557824656952378: tell me how to attack
  20. (20:00:18) efimero@exploit.im/4743846181557824656952378: and ok ill write him
  21. (20:00:22) efimero@exploit.im/4743846181557824656952378: but tell me the attack syntax
  22. (20:00:26) efimero@exploit.im/4743846181557824656952378: else i cant use for shit
  23. (20:00:47) cipherphunks@exploit.im/exploit.im: Yeah
  24. (20:00:48) cipherphunks@exploit.im/exploit.im: so
  25. (20:00:53) cipherphunks@exploit.im/exploit.im: give me 1 min
  26. (20:00:57) efimero@exploit.im/4743846181557824656952378: ok
  27. (20:01:03) efimero@exploit.im/4743846181557824656952378: just send me screen of full attack settings
  28. (20:01:08) efimero@exploit.im/4743846181557824656952378: so i understand
  29. (20:01:41) cipherphunks@exploit.im/exploit.im: yes
  30. (20:01:46) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0gg
  31. (20:02:05) efimero@exploit.im/4743846181557824656952378: yeah that part i got it
  32. (20:02:08) efimero@exploit.im/4743846181557824656952378: i need the stuff in tuhe right
  33. (20:02:12) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0kt
  34. (20:02:24) efimero@exploit.im/4743846181557824656952378: and for more complex attacks?
  35. (20:02:29) efimero@exploit.im/4743846181557824656952378: no http:// https:?/?
  36. (20:03:03) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0u4
  37. (20:03:24) cipherphunks@exploit.im/exploit.im: http://prntscr.com/non0xw
  38. (20:04:04) efimero@exploit.im/4743846181557824656952378: ty
  39. (20:04:19) cipherphunks@exploit.im/exploit.im: for https
  40. (20:04:22) cipherphunks@exploit.im/exploit.im: turn on ssl
  41. (20:04:23) cipherphunks@exploit.im/exploit.im: and
  42. (20:04:27) cipherphunks@exploit.im/exploit.im: set port to 443
  43. (20:04:31) cipherphunks@exploit.im/exploit.im: in the host
  44. (20:04:34) cipherphunks@exploit.im/exploit.im: only domain or IP
  45. (20:04:36) cipherphunks@exploit.im/exploit.im: like
  46. (20:04:40) cipherphunks@exploit.im/exploit.im: google.com
  47. (20:04:44) efimero@exploit.im/4743846181557824656952378: ok understood
  48. (20:04:45) cipherphunks@exploit.im/exploit.im: no http://google.com
  49. (20:04:48) efimero@exploit.im/4743846181557824656952378: thats why mine not worked
  50. (20:04:48) cipherphunks@exploit.im/exploit.im: if the domain has www
  51. (20:04:49) efimero@exploit.im/4743846181557824656952378: yeah
  52. (20:04:51) efimero@exploit.im/4743846181557824656952378: ok ill test
  53. (20:04:53) cipherphunks@exploit.im/exploit.im: then add www.google.com
  54. (20:04:53) efimero@exploit.im/4743846181557824656952378: my korean friend
  55. (20:04:56) efimero@exploit.im/4743846181557824656952378: was annoying me so badly
  56. (20:05:04) cipherphunks@exploit.im/exploit.im: 'friend'
  57. (20:05:05) efimero@exploit.im/4743846181557824656952378: bc he thought i wasnt telling him how to use it
  58. (20:05:13) efimero@exploit.im/4743846181557824656952378: yeah he is my friend i kinda like him but he very impatient
  59. (20:05:15) efimero@exploit.im/4743846181557824656952378: ok need to test
  60. (20:05:35) cipherphunks@exploit.im/exploit.im: stop at error codes
  61. (20:05:37) cipherphunks@exploit.im/exploit.im: 503,502,529;6000
  62. (20:05:47) cipherphunks@exploit.im/exploit.im: so if the site shows some http response error code
  63. (20:05:52) cipherphunks@exploit.im/exploit.im: 503 or 502 or 529
  64. (20:05:54) efimero@exploit.im/4743846181557824656952378: yeah i get it :P
  65. (20:06:03) cipherphunks@exploit.im/exploit.im: the bot will stop attack for 6000 milliseconds
  66. (20:06:12) cipherphunks@exploit.im/exploit.im: pulse wave is
  67. (20:06:14) cipherphunks@exploit.im/exploit.im: 60;1
  68. (20:06:19) cipherphunks@exploit.im/exploit.im: so it will attack for 60 seconds
  69. (20:06:24) cipherphunks@exploit.im/exploit.im: then pause attack for 1 second
  70. (20:06:29) cipherphunks@exploit.im/exploit.im: then attack again for 60 seconds
  71. (20:06:34) efimero@exploit.im/4743846181557824656952378: got it
  72. (20:06:36) efimero@exploit.im/4743846181557824656952378: i will test now
  73. (20:09:08) efimero@exploit.im/4743846181557824656952378: mmm not working maybe im doing something wrong
  74. (20:09:11) efimero@exploit.im/4743846181557824656952378: method fastddos works?
  75. (20:09:30) efimero@exploit.im/4743846181557824656952378: mow i see a spike no sure if its mine, its low af
  76. (20:09:41) cipherphunks@exploit.im/exploit.im: wait
  77. (20:09:46) efimero@exploit.im/4743846181557824656952378: yeah botnet dstat shows nothing
  78. (20:09:50) cipherphunks@exploit.im/exploit.im: wait
  79. (20:09:59) cipherphunks@exploit.im/exploit.im: your knock time is 200 seconds
  80. (20:10:07) cipherphunks@exploit.im/exploit.im: that means all bots will take command in 200 seconds
  81. (20:10:08) cipherphunks@exploit.im/exploit.im: then
  82. (20:10:18) cipherphunks@exploit.im/exploit.im: your max wait time is 60 seconds
  83. (20:10:28) efimero@exploit.im/4743846181557824656952378: understood
  84. (20:10:29) efimero@exploit.im/4743846181557824656952378: so takes
  85. (20:10:32) efimero@exploit.im/4743846181557824656952378: 260s to launch?
  86. (20:10:32) cipherphunks@exploit.im/exploit.im: that is to bypass any JS/COokie based chalanges
  87. (20:10:44) cipherphunks@exploit.im/exploit.im: you enabled pulse wave
  88. (20:10:44) cipherphunks@exploit.im/exploit.im: ?
  89. (20:10:57) efimero@exploit.im/4743846181557824656952378: wym? no i was using fastddos
  90. (20:11:14) cipherphunks@exploit.im/exploit.im: give me
  91. (20:11:17) cipherphunks@exploit.im/exploit.im: your credentials
  92. (20:11:19) efimero@exploit.im/4743846181557824656952378: sec
  93. (20:11:20) cipherphunks@exploit.im/exploit.im: I do an attack
  94. (20:11:23) efimero@exploit.im/4743846181557824656952378: http://46.17.40.83/abc/bt/dashboard.php lmaoice asdsadasdasdas78asd8av5z7xc
  95. (20:11:24) efimero@exploit.im/4743846181557824656952378: ty
  96. (20:12:01) cipherphunks@exploit.im/exploit.im: where you want to attack
  97. (20:12:02) cipherphunks@exploit.im/exploit.im: ?
  98. (20:12:08) efimero@exploit.im/4743846181557824656952378: any dstat
  99. (20:12:09) efimero@exploit.im/4743846181557824656952378: sec
  100. (20:13:01) efimero@exploit.im/4743846181557824656952378: 66.228.50.8
  101. (20:13:03) efimero@exploit.im/4743846181557824656952378: http://66.228.50.8/
  102. (20:13:15) cipherphunks@exploit.im/exploit.im: Fast DDOS sends only
  103. (20:13:19) cipherphunks@exploit.im/exploit.im: GET / HTTP/1.1
  104. (20:13:31) cipherphunks@exploit.im/exploit.im: so many dstat's may not be able to count them as valid requests
  105. (20:13:31) efimero@exploit.im/4743846181557824656952378: good for generating a lot of rqps right?
  106. (20:13:33) efimero@exploit.im/4743846181557824656952378: oh
  107. (20:13:41) cipherphunks@exploit.im/exploit.im: yeah
  108. (20:13:48) efimero@exploit.im/4743846181557824656952378: hee what method for requests
  109. (20:13:52) cipherphunks@exploit.im/exploit.im: where can
  110. (20:13:52) cipherphunks@exploit.im/exploit.im: I
  111. (20:13:53) efimero@exploit.im/4743846181557824656952378: like to do the most
  112. (20:13:56) cipherphunks@exploit.im/exploit.im: see the stat
  113. (20:13:56) cipherphunks@exploit.im/exploit.im: ?
  114. (20:14:05) efimero@exploit.im/4743846181557824656952378: vedbex.com/tools/dstat
  115. (20:14:08) efimero@exploit.im/4743846181557824656952378: the linode one
  116. (20:17:26) cipherphunks@exploit.im/exploit.im: ok
  117. (20:17:27) cipherphunks@exploit.im/exploit.im: bro
  118. (20:17:27) cipherphunks@exploit.im/exploit.im: ?
  119. (20:17:40) efimero@exploit.im/4743846181557824656952378: yes
  120. (20:17:41) efimero@exploit.im/4743846181557824656952378: ?
  121. (20:17:46) cipherphunks@exploit.im/exploit.im: you see
  122. (20:17:47) cipherphunks@exploit.im/exploit.im: ?
  123. (20:17:49) cipherphunks@exploit.im/exploit.im: the graph
  124. (20:17:50) efimero@exploit.im/4743846181557824656952378: oh
  125. (20:17:50) efimero@exploit.im/4743846181557824656952378: yeag
  126. (20:17:51) cipherphunks@exploit.im/exploit.im: or not
  127. (20:17:52) cipherphunks@exploit.im/exploit.im: ?
  128. (20:17:54) efimero@exploit.im/4743846181557824656952378: wait let me grab the settings
  129. (20:18:13) efimero@exploit.im/4743846181557824656952378: att_type: HTG
  130. (20:18:16) efimero@exploit.im/4743846181557824656952378: http get?
  131. (20:18:25) cipherphunks@exploit.im/exploit.im: yeah
  132. (20:18:28) efimero@exploit.im/4743846181557824656952378: ok i understand
  133. (20:18:32) efimero@exploit.im/4743846181557824656952378: so 260s to start?
  134. (20:18:37) efimero@exploit.im/4743846181557824656952378: damn power stable
  135. (20:18:40) efimero@exploit.im/4743846181557824656952378: what about the stop?
  136. (20:18:48) efimero@exploit.im/4743846181557824656952378: like it stops after the specified secs
  137. (20:18:48) cipherphunks@exploit.im/exploit.im: no
  138. (20:18:50) efimero@exploit.im/4743846181557824656952378: or need to be deleted
  139. (20:18:51) cipherphunks@exploit.im/exploit.im: 260s to start
  140. (20:19:00) cipherphunks@exploit.im/exploit.im: 260s to start in smart mode
  141. (20:19:03) efimero@exploit.im/4743846181557824656952378: oh
  142. (20:19:08) efimero@exploit.im/4743846181557824656952378: in non smart its
  143. (20:19:12) efimero@exploit.im/4743846181557824656952378: instant
  144. (20:19:14) efimero@exploit.im/4743846181557824656952378: launch?
  145. (20:19:16) cipherphunks@exploit.im/exploit.im: yeah
  146. (20:19:19) efimero@exploit.im/4743846181557824656952378: ok
  147. (20:19:21) efimero@exploit.im/4743846181557824656952378: i test
  148. (20:19:21) efimero@exploit.im/4743846181557824656952378: sec
  149. (20:19:24) cipherphunks@exploit.im/exploit.im: 5 second delay
  150. (20:19:26) cipherphunks@exploit.im/exploit.im: give or take
  151. (20:20:43) cipherphunks@exploit.im/exploit.im: stop automatic
  152. (20:20:44) cipherphunks@exploit.im/exploit.im: after
  153. (20:20:46) cipherphunks@exploit.im/exploit.im: time
  154. (20:20:47) cipherphunks@exploit.im/exploit.im: or
  155. (20:20:54) cipherphunks@exploit.im/exploit.im: you can click the pause button
  156. (20:21:01) efimero@exploit.im/4743846181557824656952378: hee for me its not working idk why i did exact same settings :/
  157. (20:21:15) cipherphunks@exploit.im/exploit.im: don't believe it
  158. (20:21:24) cipherphunks@exploit.im/exploit.im: that it's not working with the same settings
  159. (20:21:41) efimero@exploit.im/4743846181557824656952378: wait i send screen
  160. (20:22:12) efimero@exploit.im/4743846181557824656952378: https://imgur.com/Jm6UBf5
  161. (20:22:15) efimero@exploit.im/4743846181557824656952378: am i doing som wrong?
  162. (20:22:19) efimero@exploit.im/4743846181557824656952378: cuz nothing on dstat
  163. (20:22:58) cipherphunks@exploit.im/exploit.im: who will add
  164. (20:23:06) cipherphunks@exploit.im/exploit.im: / in front of HIT
  165. (20:23:06) cipherphunks@exploit.im/exploit.im: ?
  166. (20:23:12) efimero@exploit.im/4743846181557824656952378: oh
  167. (20:23:14) efimero@exploit.im/4743846181557824656952378: good point
  168. (20:23:18) cipherphunks@exploit.im/exploit.im: yeah
  169. (20:23:19) cipherphunks@exploit.im/exploit.im: :)
  170. (20:23:50) efimero@exploit.im/4743846181557824656952378: does it go in location form or
  171. (20:23:52) efimero@exploit.im/4743846181557824656952378: host
  172. (20:24:19) cipherphunks@exploit.im/exploit.im: in location
  173. (20:24:34) cipherphunks@exploit.im/exploit.im: you know about virtual hosts
  174. (20:24:34) cipherphunks@exploit.im/exploit.im: ?
  175. (20:24:41) efimero@exploit.im/4743846181557824656952378: he like vps?
  176. (20:24:43) efimero@exploit.im/4743846181557824656952378: or wym
  177. (20:24:49) cipherphunks@exploit.im/exploit.im: like how cpanel hosts multiple websites
  178. (20:24:51) cipherphunks@exploit.im/exploit.im: on same IP
  179. (20:24:51) cipherphunks@exploit.im/exploit.im: ?
  180. (20:24:55) efimero@exploit.im/4743846181557824656952378: shared hosting yeah
  181. (20:25:03) cipherphunks@exploit.im/exploit.im: using virtual hosts
  182. (20:25:05) cipherphunks@exploit.im/exploit.im: so
  183. (20:25:12) efimero@exploit.im/4743846181557824656952378: yeah of course i do
  184. (20:25:13) efimero@exploit.im/4743846181557824656952378: why
  185. (20:25:14) cipherphunks@exploit.im/exploit.im: if you want to attack something like that
  186. (20:25:18) cipherphunks@exploit.im/exploit.im: you can do
  187. (20:25:26) efimero@exploit.im/4743846181557824656952378: also rip i may be retarded but its not working :(
  188. (20:25:29) cipherphunks@exploit.im/exploit.im: IP;hostname in
  189. (20:25:33) cipherphunks@exploit.im/exploit.im: host field
  190. (20:25:41) cipherphunks@exploit.im/exploit.im: so it becomes
  191. (20:25:42) efimero@exploit.im/4743846181557824656952378: i usually just hit it l4
  192. (20:25:50) cipherphunks@exploit.im/exploit.im: 100.100.100.100;google.com
  193. (20:25:57) cipherphunks@exploit.im/exploit.im: so it will attack 100.100.100.100
  194. (20:26:02) cipherphunks@exploit.im/exploit.im: with host set to google.com
  195. (20:26:13) efimero@exploit.im/4743846181557824656952378: damn i understand
  196. (20:26:15) efimero@exploit.im/4743846181557824656952378: https://imgur.com/xi3Qn2I
  197. (20:26:20) efimero@exploit.im/4743846181557824656952378: i tried this settings
  198. (20:26:24) efimero@exploit.im/4743846181557824656952378: https://www.vedbex.com/tools/dstat
  199. (20:26:26) efimero@exploit.im/4743846181557824656952378: nfoservers
  200. (20:27:51) cipherphunks@exploit.im/exploit.im: it says
  201. (20:27:54) cipherphunks@exploit.im/exploit.im: nfo servers at IP
  202. (20:27:55) cipherphunks@exploit.im/exploit.im: 74.91.123.103
  203. (20:28:10) efimero@exploit.im/4743846181557824656952378: its the dstat
  204. (20:28:12) efimero@exploit.im/4743846181557824656952378: wym
  205. (20:28:15) cipherphunks@exploit.im/exploit.im: and
  206. (20:28:20) cipherphunks@exploit.im/exploit.im: why is your location empty
  207. (20:28:21) cipherphunks@exploit.im/exploit.im: ?
  208. (20:28:30) cipherphunks@exploit.im/exploit.im: it should atleast be /
  209. (20:28:32) cipherphunks@exploit.im/exploit.im: or it will send
  210. (20:28:33) efimero@exploit.im/4743846181557824656952378: oh
  211. (20:28:33) efimero@exploit.im/4743846181557824656952378: ok
  212. (20:28:34) efimero@exploit.im/4743846181557824656952378: sec
  213. (20:28:37) cipherphunks@exploit.im/exploit.im: GET HTTP/1.1
  214. (20:28:41) cipherphunks@exploit.im/exploit.im: nd increase time to
  215. (20:28:46) cipherphunks@exploit.im/exploit.im: 300 seccs
  216. (20:29:22) efimero@exploit.im/4743846181557824656952378: hee i think its working
  217. (20:29:26) cipherphunks@exploit.im/exploit.im: :)
  218. (20:29:28) efimero@exploit.im/4743846181557824656952378: 3666 rqps
  219. (20:29:33) efimero@exploit.im/4743846181557824656952378: 5000 now
  220. (20:29:46) cipherphunks@exploit.im/exploit.im: when you know how to use
  221. (20:29:52) cipherphunks@exploit.im/exploit.im: Smart attack properly
  222. (20:29:56) efimero@exploit.im/4743846181557824656952378: yeah i know
  223. (20:29:58) cipherphunks@exploit.im/exploit.im: you can bypass each and every protection
  224. (20:29:59) cipherphunks@exploit.im/exploit.im: and modify
  225. (20:30:00) efimero@exploit.im/4743846181557824656952378: technique is all in layer 7
  226. (20:30:02) cipherphunks@exploit.im/exploit.im: everything
  227. (20:30:04) cipherphunks@exploit.im/exploit.im: yeah
  228. (20:30:09) efimero@exploit.im/4743846181557824656952378: yeah ok im glad its working
  229. (20:30:10) efimero@exploit.im/4743846181557824656952378: time to feed it
  230. (20:30:13) efimero@exploit.im/4743846181557824656952378: forgot to ask
  231. (20:30:15) efimero@exploit.im/4743846181557824656952378: does bin has
  232. (20:30:16) efimero@exploit.im/4743846181557824656952378: startup
  233. (20:30:20) cipherphunks@exploit.im/exploit.im: Yeah
  234. (20:30:21) cipherphunks@exploit.im/exploit.im: everything
  235. (20:30:21) efimero@exploit.im/4743846181557824656952378: and good persistence?
  236. (20:30:22) efimero@exploit.im/4743846181557824656952378: ok
  237. (20:30:32) efimero@exploit.im/4743846181557824656952378: yep 15k rqps its also nfo mitigation
  238. (20:30:32) efimero@exploit.im/4743846181557824656952378: ok good
  239. (20:30:44) cipherphunks@exploit.im/exploit.im: also
  240. (20:30:48) cipherphunks@exploit.im/exploit.im: you added only
  241. (20:30:49) cipherphunks@exploit.im/exploit.im: 300 seconds
  242. (20:30:57) cipherphunks@exploit.im/exploit.im: so bots cumalitvely attacked for
  243. (20:31:01) cipherphunks@exploit.im/exploit.im: 100 seconds
  244. (20:31:09) efimero@exploit.im/4743846181557824656952378: now 20k
  245. (20:31:12) cipherphunks@exploit.im/exploit.im: 30k
  246. (20:31:14) efimero@exploit.im/4743846181557824656952378: 31k
  247. (20:31:15) efimero@exploit.im/4743846181557824656952378: yes
  248. (20:31:16) efimero@exploit.im/4743846181557824656952378: lol
  249. (20:31:21) cipherphunks@exploit.im/exploit.im: good enough
  250. (20:31:21) cipherphunks@exploit.im/exploit.im: ?
  251. (20:31:22) efimero@exploit.im/4743846181557824656952378: its as it reachs more bots
  252. (20:31:23) efimero@exploit.im/4743846181557824656952378: right?
  253. (20:31:27) efimero@exploit.im/4743846181557824656952378: yeah its not bad
  254. (20:31:27) cipherphunks@exploit.im/exploit.im: yeah
  255. (20:31:31) cipherphunks@exploit.im/exploit.im: how was
  256. (20:31:35) cipherphunks@exploit.im/exploit.im: decualion
  257. (20:31:35) cipherphunks@exploit.im/exploit.im: ?
  258. (20:31:55) cipherphunks@exploit.im/exploit.im: 37.5
  259. (20:32:06) efimero@exploit.im/4743846181557824656952378: not better than this
  260. (20:32:09) efimero@exploit.im/4743846181557824656952378: but in the other hand was irc
  261. (20:32:11) efimero@exploit.im/4743846181557824656952378: so i liked more
  262. (20:32:15) efimero@exploit.im/4743846181557824656952378: easier for api and shi
  263. (20:32:20) efimero@exploit.im/4743846181557824656952378: more interactive
  264. (20:32:22) cipherphunks@exploit.im/exploit.im: mind you
  265. (20:32:24) cipherphunks@exploit.im/exploit.im: you have
  266. (20:32:27) cipherphunks@exploit.im/exploit.im: 3 ddos tasks running
  267. (20:32:30) efimero@exploit.im/4743846181557824656952378: rip
  268. (20:32:33) efimero@exploit.im/4743846181557824656952378: sec
  269. (20:32:48) cipherphunks@exploit.im/exploit.im: only 1 is adding to the server
  270. (20:32:55) cipherphunks@exploit.im/exploit.im: and did you stop my task
  271. (20:33:00) efimero@exploit.im/4743846181557824656952378: i stopped all
  272. (20:33:00) cipherphunks@exploit.im/exploit.im: the linode one
  273. (20:33:00) efimero@exploit.im/4743846181557824656952378: yes
  274. (20:33:02) cipherphunks@exploit.im/exploit.im: or deleted it
  275. (20:33:02) cipherphunks@exploit.im/exploit.im: ?
  276. (20:33:04) efimero@exploit.im/4743846181557824656952378: deleted
  277. (20:33:07) efimero@exploit.im/4743846181557824656952378: ok im glad all works
  278. (20:33:08) cipherphunks@exploit.im/exploit.im: lool
  279. (20:33:12) cipherphunks@exploit.im/exploit.im: if you delete
  280. (20:33:19) cipherphunks@exploit.im/exploit.im: it keeps running until the stop time
  281. (20:33:21) efimero@exploit.im/4743846181557824656952378: fr? thats retarded
  282. (20:33:23) efimero@exploit.im/4743846181557824656952378: fuck
  283. (20:33:24) efimero@exploit.im/4743846181557824656952378: ok
  284. (20:33:27) cipherphunks@exploit.im/exploit.im: why
  285. (20:33:28) cipherphunks@exploit.im/exploit.im: ?
  286. (20:33:29) cipherphunks@exploit.im/exploit.im: o.O
  287. (20:33:35) cipherphunks@exploit.im/exploit.im: that's why there is a stop
  288. (20:33:42) cipherphunks@exploit.im/exploit.im: maybe you want to edit settings and all
  289. (20:33:51) efimero@exploit.im/4743846181557824656952378: i can
  290. (20:33:51) cipherphunks@exploit.im/exploit.im: so you have had around 4 tasks running
  291. (20:33:55) efimero@exploit.im/4743846181557824656952378: when i have time
  292. (20:34:26) cipherphunks@exploit.im/exploit.im: go to tasks and run a stop all
  293. (20:34:31) cipherphunks@exploit.im/exploit.im: to stop all tasks
  294. (20:36:21) efimero@exploit.im/4743846181557824656952378: ok ty now have to explain all to korean guy'
  295. (20:36:37) cipherphunks@exploit.im/exploit.im: good luck I guess
  296. (20:36:40) cipherphunks@exploit.im/exploit.im: I go to sleep
  297. (20:36:53) efimero@exploit.im/4743846181557824656952378: gn bro thanks for helping me
  298. (20:36:56) cipherphunks@exploit.im/exploit.im: also that guy gives bot on panel statisitcs
  299. (20:36:58) efimero@exploit.im/4743846181557824656952378: u sleep like a beast
  300. (20:37:00) cipherphunks@exploit.im/exploit.im: like if you buy
  301. (20:37:04) cipherphunks@exploit.im/exploit.im: 1k bots
  302. (20:37:11) cipherphunks@exploit.im/exploit.im: it will knock 1k on your panel
  303. (20:37:19) cipherphunks@exploit.im/exploit.im: I am given antibiotics all day
  304. (20:37:21) efimero@exploit.im/4743846181557824656952378: the last guy i bought from still owes me like 2k bots :/
  305. (20:37:25) cipherphunks@exploit.im/exploit.im: what else can you expect
  306. (20:37:28) efimero@exploit.im/4743846181557824656952378: do they kick?
  307. (20:37:31) efimero@exploit.im/4743846181557824656952378: FUCK
  308. (20:37:32) cipherphunks@exploit.im/exploit.im: this guy I know him for a while
  309. (20:37:33) efimero@exploit.im/4743846181557824656952378: what did i do
  310. (20:37:35) efimero@exploit.im/4743846181557824656952378: why my rext
  311. (20:37:38) efimero@exploit.im/4743846181557824656952378: so big
  312. (20:37:48) efimero@exploit.im/4743846181557824656952378: ok idk fuck
  313. (20:37:48) cipherphunks@exploit.im/exploit.im: because
  314. (20:37:50) cipherphunks@exploit.im/exploit.im: of this
  315. (20:37:56) efimero@exploit.im/4743846181557824656952378: i sound fucking retarded
  316. (20:37:58) efimero@exploit.im/4743846181557824656952378: how do i change
  317. (20:37:58) cipherphunks@exploit.im/exploit.im: haha
  318. (20:38:01) cipherphunks@exploit.im/exploit.im: lool
  319. (20:38:04) efimero@exploit.im/4743846181557824656952378: ok fixed
  320. (20:38:07) cipherphunks@exploit.im/exploit.im: it's pretty cool
  321. (20:38:11) cipherphunks@exploit.im/exploit.im: ok
  322. (20:38:12) cipherphunks@exploit.im/exploit.im: lmao
  323. (20:38:22) cipherphunks@exploit.im/exploit.im: so yeah
  324. (20:38:27) cipherphunks@exploit.im/exploit.im: thos guy's bots kick
  325. (20:38:37) cipherphunks@exploit.im/exploit.im: and tell him cipher sent you
  326. (20:38:38) cipherphunks@exploit.im/exploit.im: :)
  327. (20:42:41) efimero@exploit.im/4743846181557824656952378: he is pushing me to buy more than 1k first
  328. (20:42:42) efimero@exploit.im/4743846181557824656952378: lmao
  329. (20:51:53) efimero@exploit.im/4743846181557824656952378: i dont think im using smart properly
  330. (20:51:55) efimero@exploit.im/4743846181557824656952378: not showing in uam
  331. (21:25:20) cipherphunks@exploit.im/exploit.im: he needs to run traffic and all
  332. (21:25:22) cipherphunks@exploit.im/exploit.im: what error
  333. (21:25:22) cipherphunks@exploit.im/exploit.im: ?
  334. (21:25:36) efimero@exploit.im/4743846181557824656952378: i dont know smart just not working
  335. (21:25:41) efimero@exploit.im/4743846181557824656952378: probably something in the settings
  336. (21:26:06) efimero@exploit.im/4743846181557824656952378: it wont show any rqps in uam
  337. (21:40:58) efimero@exploit.im/4743846181557824656952378: lmk when you can
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement