{"id":325,"date":"2006-08-30T06:00:30","date_gmt":"2006-08-30T06:00:30","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/08\/how-to-get-ops-and-takeover-a-channel-on-irc-hack-hacking\/"},"modified":"2015-09-09T19:40:37","modified_gmt":"2015-09-09T11:40:37","slug":"how-to-get-ops-and-takeover-a-channel-on-irc-hack-hacking","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/08\/how-to-get-ops-and-takeover-a-channel-on-irc-hack-hacking\/","title":{"rendered":"How to get Ops and takeover a channel on IRC Hack Hacking"},"content":{"rendered":"

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they were written like 10 years ago and don’t work anymore. The method I’m presenting here DOES work, but it takes practice, patience, and careful reading.<\/p>\n

Tools needed<\/strong><\/p>\n

An IRC script that can do mass deops quickly and easily (preferibly one that lets you press an F# (function) key to do mass deops, or one that automatically mass deops once you gain ops). You don’t want to have to start going through popup menus since you have to do this quickly.<\/p>\n

An IRC script that can do mass CTCP versioning. I’ll explain later.<\/p>\n

A wingate scanner. These aren’t too hard to find. Check http:\/\/packetstorm.linuxsecurity.com\/wingate-scanner\/<\/a><\/p>\n

A few ‘war’ programs to exploit irc clients, nuke, flood, etc. When I say flood, I don’t mean like a ping flood in mIRC, I mean like a real ICMP flooder. Try to find Final Fortune, it’s a program I made myself… very effective.<\/p>\n

A lot of patience.<\/p>\n

A brain.<\/p>\n

Process<\/strong><\/p>\n

Find a channel you want to takeover. This method will NOT work on Dalnet or any other networks with anything like ChanServ. Also, this won’t work if all of the ops in the channel are bots (unless they’re VERY badly programmed). OK, so once you’re in the channel, do a Version CTCP on all of the ops in there. Look for exploitable scripts (some versions of ircN, mIRC 5.3x, mIRC 5.4, etc.). Now, let’s say you find someone with nick ‘DumbOP’ and he’s using a script that you know you can exploit and disconnect him from IRC (but don’t crash him yet!).<\/p>\n

\/dns DumbOP to find his IP. Now take your handy wingate scanner. Plug in his IP and search for a similar one with the scanner. If you can’t find one in the same Class C range, try Class B if you have to, but make sure it resolves to something close to DumbOP’s IP.<\/p>\n

Good, so now you have a wingate IP similar to DumbOP’s. If you couldn’t find an IP close to his, try this with another op with an exploitable script. Do a \/whois DumbOP to find the IRC server he’s on and his ident (the thing before the @ip). So now that you have the wingate IP, what do you do with it? I’ll assume you never wingated before, and I’ll explain how to do it with mIRC. For
\nthe example, let’s say the wingate IP is 1.2.3.4, DumbOP’s ident is ‘opident’, and DumbOP’s irc server is ‘irc.server.net’.<\/p>\n

Open a new instance of mIRC, and in the status window, do the following:<\/p>\n

\/server 1.2.3.4 23<\/p>\n

You’ll see it say “WinGate>NICK (some nick)”<\/p>\n

Right after you see this, type:<\/p>\n

\/quote irc.server.net 6667<\/p>\n