• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

How to get Ops and takeover a channel on IRC Hack Hacking

August 30, 2006

Views: 188,771

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they were written like 10 years ago and don’t work anymore. The method I’m presenting here DOES work, but it takes practice, patience, and careful reading.

Tools needed

An IRC script that can do mass deops quickly and easily (preferibly one that lets you press an F# (function) key to do mass deops, or one that automatically mass deops once you gain ops). You don’t want to have to start going through popup menus since you have to do this quickly.

An IRC script that can do mass CTCP versioning. I’ll explain later.

A wingate scanner. These aren’t too hard to find. Check http://packetstorm.linuxsecurity.com/wingate-scanner/

A few ‘war’ programs to exploit irc clients, nuke, flood, etc. When I say flood, I don’t mean like a ping flood in mIRC, I mean like a real ICMP flooder. Try to find Final Fortune, it’s a program I made myself… very effective.

A lot of patience.

A brain.

Process

Find a channel you want to takeover. This method will NOT work on Dalnet or any other networks with anything like ChanServ. Also, this won’t work if all of the ops in the channel are bots (unless they’re VERY badly programmed). OK, so once you’re in the channel, do a Version CTCP on all of the ops in there. Look for exploitable scripts (some versions of ircN, mIRC 5.3x, mIRC 5.4, etc.). Now, let’s say you find someone with nick ‘DumbOP’ and he’s using a script that you know you can exploit and disconnect him from IRC (but don’t crash him yet!).

/dns DumbOP to find his IP. Now take your handy wingate scanner. Plug in his IP and search for a similar one with the scanner. If you can’t find one in the same Class C range, try Class B if you have to, but make sure it resolves to something close to DumbOP’s IP.

Good, so now you have a wingate IP similar to DumbOP’s. If you couldn’t find an IP close to his, try this with another op with an exploitable script. Do a /whois DumbOP to find the IRC server he’s on and his ident (the thing before the @ip). So now that you have the wingate IP, what do you do with it? I’ll assume you never wingated before, and I’ll explain how to do it with mIRC. For
the example, let’s say the wingate IP is 1.2.3.4, DumbOP’s ident is ‘opident’, and DumbOP’s irc server is ‘irc.server.net’.

Open a new instance of mIRC, and in the status window, do the following:

/server 1.2.3.4 23

You’ll see it say “WinGate>NICK (some nick)”

Right after you see this, type:

/quote irc.server.net 6667

You’ll probably then see something like

“Connecting to host USER…Host name lookup for USER failedirc.server.net 6667
Connecting to host irc.server.net…connected”

You might see more than this, you might see less. The important thing to watch for is:

” -1.2.3.4- *** Looking up your hostname…
-1.2.3.4- *** Checking Ident
-1.2.3.4- *** Found your hostname
-1.2.3.4- *** Got Ident response ”

Once you see that, type:

/quote user opident opident opident opident
/quote nick DumbOP1

You don’t have to use ‘DumbOP1’, just use any temporary nick you want. Also, you can use ‘/raw’ instead of ‘/quote’ if you wish.

If you did everything correctly, you’ll see the MOTD for the irc server, and you’ll be connected. If by chance 1.2.3.4 is k-lined from irc.server.net, you’ll have to go through the whole process again with a different server. This makes your “spoofing” (it’s not REALLY spoofing) attempt less realistic looking, but if you have to use a different server, then do it.

Once you’re online, everything works like normal. Do a /whois DumbOP1 to see your info. It should be close to DumbOP’s.

You’re halfway there! The next thing to do (not necessary, but recommended) is to try to find out some info on DumbOP. I recommend trying “nbtstat -A ” at the dos prompt, that might provide you with a name or two if you’re lucky. This is just some useful information that might
come in handy. Also, try searching ICQ for his nick and check his info, you might find good stuff in there.

The next step is to disconnect DumbOP from IRC. Either use an exploit, or nuke him (Click is sometimes useful (if you don’t know what Click is, it’s a program made by Rhad to have an IRC server ‘nuke’ a person… it sometimes works)), or ICMP flood him. Do anything you have to to disconnect him. By the way, you should have your original IRC session still open, with your
wingated IRC session running as a different instance of mIRC (you should have 2 ‘versions’ of mIRC running at the same time now, one with your original nick, info, etc., and the other with the DumbOP1 stuff). While you’re attacking DumbOP, monitor the channel with your original session of mIRC and wait for DumbOP to disconnect. Immediately after you see that, rename DumbOP1 to DumbOP (/nick DumbOP) and join the channel! Don’t say anything! If you’re lucky, a stupid op will op you. Then mass deop. If nothing happens for about 5 or 6 minutes, mass message the ops, saying something like “what happened? why am I not opped?”. You might get into a conversation. Remember to keep calm, and talk like an op. Don’t freak out and demand for them to op you. The “useful information” might come in handy now. Often the ops will tell you to get ops from the bots. Just say something like you’re desynched from the bots because of your ping timeout.

If your impersonation is good enough, 9/10 times they’ll op you. Like I said before, IMMEDIATELY do a mass deop. If possible, bring AT LEAST two bots (real bots, not just simple clones) into the channel to hold it and protect it.

If you followed all these steps thoroughly, you should be able to takeover most channels as long as there are at least 2 human ops (1 of which you’ll be ‘spoofing’, the other you’ll be messaging to op you).

Good luck and have fun!

Originally by St0rmer from EFNet, updated by Darknet.

Related Posts:

  • An Introduction To Web Application Security Systems
  • Emerging Threats ETOpen - Anti-malware IDS/IPS Ruleset
  • Understanding the Deep Web, Dark Web, and Darknet…
  • HTTrack - Website Downloader Copier & Site Ripper Download
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacker Culture, Hacking News, Social Engineering Tagged With: IRC



Reader Interactions

Comments

  1. ManaBoleh.com says

    August 30, 2006 at 6:50 am

    Dude…this is so olskool! Those tricks are kinda old but it sure works!

    Works well on EFnet and IRCnet where Server Bots are used instead of ChanServ (dalnet) or X (Undernet).

    BTW, eggdrop bots can be exploited too to gain OP access ;)

  2. Darknet says

    August 30, 2006 at 7:34 am

    Yah man this is old styles ;)

  3. farking says

    September 1, 2006 at 12:05 pm

    this way too old stuff man.. wingate? i still remember it.. and none of it can make it to the irc network as far as i know now..heheheh …better use an eggdrop or other bots..thats better :D

  4. IRCGhost says

    October 14, 2006 at 8:32 pm

    Very old and stupid idea !

    Damnnnnnnnn wingate ! using ICMP ping or version, it can be disable CTCP heheeh so fuck off freaking guy

  5. Darknet says

    October 15, 2006 at 8:14 am

    IRCGhost amazing, you are really smart, please do write a better article for us :)

  6. backbone says

    November 22, 2006 at 8:35 am

    i will not criticise the article even if it’s oldschool ;) because this is the motto of Darknet “share your knowledge”, anyway I added my comment because there is a easyer way to maintain 2 conncetions through mIRC, other than opening 2 clients

    /server -m irc.server.org

  7. havuk says

    November 24, 2006 at 5:42 am

    i’ve done all these since 97 (so many irc enemies, so i quit) and i agree this howto is already obsolete. that’s why you don’t see a lot of new warscripts these days because it just doesn’t work anymore.

    wingates doesn’t work anymore (btw it’s called bouncing) and most ops are now smart enough to use bnc. i think kids now days prefer ‘booting’ on the yahoo chatrooms now since it’s the ‘in thing’ today.

    now i just hang out on irc to download stuff and i prefer it this way. anyway it’s still a good article.

  8. seck says

    December 7, 2006 at 11:15 am

    this way is a sucker of dick way to haack a fucking hatest hackers irc what the fuck is a wingate made a fucking program that made in one second hack all like a winner.

  9. ermpet says

    January 14, 2007 at 7:34 pm

    thanks a good article…. show some respect guys… thanks for share some knowledge

  10. bathosai says

    February 4, 2007 at 12:26 pm

    wow!! ive never tot its imposibble. but its hard..hehehe
    anyway is it possible to mass deop adn ban from the channel
    that you dont have an accsess???

  11. Vincent Belmont says

    March 3, 2007 at 11:37 am

    This method is lame and doesn’t really work and usually all ircd have chanserv or some form of a channel service, You either need to use a social engineering method, a retarded ircop, or the cahnnel operators old email address depending on if nickserv displays it, and then do the sendpass command and hope there password is the same or gives you some sort of access to a newer email address they use and attempt ti find a password either to there channel or nickname, “half the time people don’t think to change there passwords”, That is currently the only real way a regular access irc user can take a channel.

  12. Jas says

    May 11, 2007 at 7:15 pm

    I’m still learning. Got any ideas that work

  13. hitlocke says

    May 23, 2007 at 2:06 pm

    its good for knowledge of what he is sharing. Whether it works or not, or how practical it is…then it is up to us to find out on our own, and we’ll learn even more… the outcome of such experiment we’ll share it together and could generate better ideas.

  14. kupz says

    May 24, 2007 at 2:42 am

    where can i find those tools u mentioned like: FINAL FORTUNE and CLICK..?? I tried looking for these files but none is available..

    Can u guys out there tell me wr can i find these plus… any working tools that clone flood a channel (undernet)…thanks

    Pls send it to my email [email protected] .. i appreciate it very very….

  15. Daniel says

    June 4, 2007 at 8:55 am

    i just tried it on a couple stupid channels. .. didn’t manage to get ops on 2 but got one.

    and i didnt know you wrote Final Fortune! props!

  16. k4mpr3t says

    November 23, 2007 at 6:59 pm

    hmmm …. those theory still works, even though it does outdated…. anyway … nice to hear ya ..guys ..

    have “hack” days !!!

  17. Ritchie says

    April 20, 2008 at 3:16 pm

    doesnt work, says unable to resolve hostname or ip

  18. LebWolf says

    May 25, 2008 at 4:39 pm

    well its an old idea ; and it will not work in a channel with X protection. btw ; its not easy to find the same ip used by that op . and alot of new mirc users disable the CTCP . you want to takeover a channel ? buy an eggdrop from the company they use :P LOL ; its better :D ….. cause they all have the same conf. so that you can get access :P to it before a smart eggdrop user :D change them :P
    good luck all … and show some respect for all idea’s …
    LebWolf ( undernet user since 2000 ) .

  19. yikes says

    July 27, 2008 at 2:02 am

    i hacked the whole irc with this method. i m now the Gawd of irc. thanks.

  20. lyz says

    August 15, 2008 at 10:16 am

    yay yikes. pretty cool stuff eh? me am just starting to read notes on how to use irc..

  21. Evan says

    January 11, 2009 at 10:21 am

    hi there i just need some help im an old irc user but im not into hacking i was just wondering if it is possible to crack hack or take over a channel on dalnet server’s if yes im willing to pay any amount.

  22. Bogwitch says

    January 12, 2009 at 5:28 pm

    Yup, if money is no object, buy DalNet.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Reconnoitre - Open-Source Reconnaissance and Service Enumeration Tool

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Views: 305

Reconnoitre is an open-source reconnaissance tool that automates multithreaded information gathering … ...More about Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Scanners-Box - Open-Source Reconnaissance and Scanning Toolkit

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Views: 478

Scanners-Box is an open-source, community-curated collection of scanners and reconnaissance … ...More about Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Red Teaming LLMs 2025 - Offensive Security Meets Generative AI

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

Views: 512

As enterprises deploy large language models (LLMs) at scale, the offensive security discipline of … ...More about Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

gitlab-runner-research - PoC for abusing self-hosted GitLab runners

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

Views: 335

gitlab-runner-research is a proof-of-concept repository and write-up that demonstrates how attackers … ...More about gitlab-runner-research – PoC for abusing self-hosted GitLab runners

mcp-scanner - Python MCP Scanner for Prompt-Injection and Insecure Agents

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Views: 578

mcp-scanner is an open-source Python tool that scans Model Context Protocol (MCP) servers and agent … ...More about mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Deepfake-as-a-Service 2025 - How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Views: 668

Deepfake operations have matured into a commercial model that attackers package as … ...More about Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (231)
  • Cryptography (85)
  • Dark Web (4)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (12)
  • Hacker Culture (10)
  • Hacking News (236)
  • Hacking Tools (708)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,394,859)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,813)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,292)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,141)
  • Password List Download Best Word List – Most Common Passwords (934,345)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,065)
  • Hack Tools/Exploits (673,983)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,049)

Search

Recent Posts

  • Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool November 10, 2025
  • Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit November 7, 2025
  • Red Teaming LLMs 2025 – Offensive Security Meets Generative AI November 5, 2025
  • gitlab-runner-research – PoC for abusing self-hosted GitLab runners November 3, 2025
  • mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents October 31, 2025
  • Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses October 29, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy