- Joined
- Feb 4, 2024
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.


the dumber the person is, the less likely they are to be affected by the nigger pedo horrors of ss13 community.My friend really likes the game and he really likes ratwood but hates the erp side of things and basically tried to ignore it. He's talked about starting a server that's just the same game but without any erp.
Any clue how you would even do this without being a programmer or having lots of tech experience.
He's basically a military grunt that can barely mod Skyrim without getting confused.
I'm worried that space thirteen is so technically complex and unique that only tranny's make it anymore and so all the servers are gay and retarded and for gooners.
It is trivially easy if you don't care about features, and you can literally just run it off of your own machine. There's two apps in the folder you download off of github, the "make it ready" button and the "go" button. It requires a little more technical knowhow if you want to set up a database so that you are able to ban people and stuff, but if you don't care about that and it's just you and your homies you can have 12-15 people connect without your PC shitting itself. Beyond that I haven't tested personally, but buying hosting for a tg based server is allegedly not the most difficult thing in the world and not giga expensive. If you can find someone with sysadmin skills and pay them like 20 bucks to set up heidisql and mariadb for you via remote viewer, you're covered.My friend really likes the game and he really likes ratwood but hates the erp side of things and basically tried to ignore it. He's talked about starting a server that's just the same game but without any erp.
Any clue how you would even do this without being a programmer or having lots of tech experience.
He's basically a military grunt that can barely mod Skyrim without getting confused.
I'm worried that space thirteen is so technically complex and unique that only tranny's make it anymore and so all the servers are gay and retarded and for gooners.
Ratwood is vscode /tg/ c. 2019. So he will have to download VS code to "properly" compile it with the DM extension. My suggestions:I do not know what base ratwood is tho.
End user wise, it's not too complex if he's just hosting (Aside from some ultra odd proc/vv calls). It's just noodle-spagetti code (shitcode) everywhere. Thank god for AI.I'm worried that space thirteen is so technically complex and unique that only tranny's make it anymore and so all the servers are gay and retarded and for gooners.
Can you elaborate? What can a client connecting to a server do?Expect your host device to get assraped by some troon autist with malware if it's constantly on public.
It's not about the game server itself, there's little an ss13 server can do (assuming you're using a version with all known admin-elevation exploits fixed). Your concern would be with having a proper network set up.Can you elaborate? What can a client connecting to a server do?
So is the concern that there could be an unpublicized method for a client to do a shell injection attack on the server's OS?It's not about the game server itself, there's little an ss13 server can do (assuming you're using a version with all known admin-elevation exploits fixed). Your concern would be with having a proper network set up.
To get into the nitty-gritty in regards to host security on BYOND, your main concern is the shell() function, which enables calls to the system's shell. If you run in Trusted mode, which is required to utilize DLLs that are common-place, shell() can be used. Now, servers like tgstation have this function behind lock and key, and I don't personally know of any exploits that would allow an admin to use the function via AdvancedProcCall or SDQL, but that doesn't mean they don't exist. Alot, and I mean alot, has to go wrong on the server's end to enable a random user to execute arbitrary shell commands. But its *theoretically* possible, if the codebase is old and lacking proper exploit patches.
You don't even need the client lmao.Can you elaborate? What can a client connecting to a server do?
I preface by saying my interest in cybersec is just a hobby. My argument is from memory exploits which require a lot more work than retard flooding malformed packets DDOS.Alot, and I mean alot, has to go wrong on the server's end to enable a random user to execute arbitrary shell commands. But its *theoretically* possible, if the codebase is old and lacking proper exploit patches.
| Bits | Possibilities | Average | Worst case |
|---|---|---|---|
| 5 | 32 | 1.6 hrs | 3.2 hrs |
| 6 | 64 | 3.2 hrs | 6.4 hrs |
| 7 | 128 | 6.4 hrs | 12.8 hrs |
| 8 | 256 | 12.8 hrs | 25.6 hrs |
| 9 | 512 | 25.6 hrs | 51.2 hrs |
| 10 | 1,024 | 2.1 days | 4.3 days |
| 11 | 2,048 | 4.3 days | 8.5 days |
| 12 | 4,096 | 8.5 days | 17.1 days |
| 13 | 8,192 | 17.1 days | 34.1 days |
| 14 | 16,384 | 34.1 days | 68.3 days |
| 15 | 32,768 | 68.3 days | 136.5 days |
| 16 | 65,536 | 136.5 days | 273.1 days |
| Bits | Possibilities | Average | Worst case |
|---|---|---|---|
| 23 | 8,388,608 | 95.7 years | 191.5 years |
| 25 | 33,554,432 | 383 years | 766 years |
| 28 | 268,435,456 | 3,063 years | 6,126 years |
| 30 | 1,073,741,824 | 12,251 years | 24,502 years |
| 33 | 8,589,934,592 | 98,005 years | 196,010 years |
| Scenario | Entropy | Average | Worst case |
|---|---|---|---|
| Max load (late round) | 5 bits | 1.6 hrs | 3.2 hrs |
| High load | 6 bits | 3.2 hrs | 6.4 hrs |
| Moderate load | 10 bits | 2.1 days | 4.3 days |
| Just restarted | 14 bits | 34.1 days | 68.3 days |
shell() command writes directly to the OS. You need not use shell() attacks if you can exhaust resources and force a use after free to compromise the host user. Though you can use shell(). You could also use system() in the c library.So is the concern that there could be an unpublicized method for a client to do a shell injection attack on the server's OS?
Would this risk extend to the ability to do the same attack on other clients connected to the same server?
Clients cannot "speak" to other clients. The server can speak to clients, but it can only execute instructions that Dreamseeker understands. Currently, there are no known security issues with Dreamseeker. That said, the most damage you could do to a player via the server is sending a malicious script to an open browser to mine bitcoin or something. But because it's a (heavily locked down) browser window that closes when Dreamseeker closes, that's not exactly that harmful. You can only do as much damage as an annoying adfly page could.So is the concern that there could be an unpublicized method for a client to do a shell injection attack on the server's OS?
Would this risk extend to the ability to do the same attack on other clients connected to the same server?
They do not persist between program restarts, they are unloaded. I am not incredibly technically minded, but my understanding is that the library is loaded into RAM the first time a handle is requested, and it is unloaded when the host program terminates, as DLLs are effectively reference counted. The only way memory could persist is if the DLL saves data to disk, like any other program.I think on Windows libraries (DLLs) persist on program restarts, so just use that, and assume they aren't running dream daemon as admin (lol), abuse the fuck out of the print spooler or other service to get root. Sorry I understand linux more than windows so not much help on this end.
The runtime log doesn't include any pointers, it includes human-friendly function names that were compiled into the DMB via the DEBUG flag. That's not how they're actually compiled, as the DMB is effectively a bundle of byond op-codes that DreamDaemon interprets.We know BYOND starts chugging at ~2-3GB, then assume that gives an entropy of 5-10 bits, so if someone scripts an attack to cause memory leakage (be it from gameplay, or crafted packets) then it becomes trivial to cause this issue (only 32 tries!). It could probably be done overnight when nobody plays too. That's assuming you didn't find a pointer off the admin/debug/error logs of which most runtimes show a pointer (at least on bay, IDK tg)...
I stand corrected on both (Too lazy to boot up and force a runtime). I went and checked the 32bit compat registry edit and it is empty. BYOND is old and strange though, I assumed the chance of this was high, lots of weird as custom software pre Vista did that. Specifically, the CJK inputs (Tencent IME, Sogu IME) come to mind.They do not persist between program restarts, they are unloaded. I am not incredibly technically minded, but my understanding is that the library is loaded into RAM the first time a handle is requested, and it is unloaded when the host program terminates, as DLLs are effectively reference counted. The only way memory could persist is if the DLL saves data to disk, like any other program.
In theory, I guess you can craft a malformed file into an rsc or resource downloaded if you had access to the host server to force another overflow/use after free.In reality, I don't think troons or even autists have the patience for that, I guess maybe if Bashar Al Assad (pre-coup) was playing SS13 and some nation state actor wanted to spy on him, maybe.That said, the most damage you could do to a player via the server is sending a malicious script to an open browser to mine bitcoin or something.
I know you're specifically talking about windows, but don't most populated servers run on Linux and wouldn't doing a very basic setup of a Linux server involve disabling the root user and running tg server on a user without su privileges?I think on Windows libraries (DLLs) persist on program restarts, so just use that, and assume they aren't running dream daemon as admin (lol), abuse the fuck out of the print spooler or other service to get root. Sorry I understand linux more than windows so not much help on this end.
Any SS13 server that has consulted the big hosts has a secure setup. If there was a security exploit it would've already been used on them. Windows Server is a popular OS for the "mid-tier" servers that are usually just a guy and some friends, as it's far less of a pain in the ass for the average joe. It's not notably more or less secure, it's really just a difference in user-friendliness and some weird byond performance quirks. Linux has less overhead than Windows Server and the file IO speed is signficantly faster because Linux's file system isn't fucking awful.I know you're specifically talking about windows, but don't most populated servers run on Linux and wouldn't doing a very basic setup of a Linux server involve disabling the root user and running tg server on a user without su privileges?
I guess since the discussion is about the perspective of somebody just running their own server for friends the assumption would be it's on a windows machine that you assume hasn't been secured and therefore you'd want it dehubbed just to avoid public access and people trying to fuck with it.
Correct. I was considering from the perspective of "random dude and bros having fun" instead of "beg for monies because all spent on yiffsuit with knotdick".I guess since the discussion is about the perspective of somebody just running their own server for friends the assumption would be it's on a windows machine that you assume hasn't been secured and therefore you'd want it dehubbed just to avoid public access and people trying to fuck with it.
Do you ever think there's excess protesting on the part of these hosts over engaging in shameful behavior between this and Duke?Correct. I was considering from the perspective of "random dude and bros having fun" instead of "beg for monies because all spent on yiffsuit with knotdick".
I can't be bothered because its lame and unfunny but MSO has been sitting in coderbus for a few months randomly replying to years old discussions about him to go "*she" and generally just fish for attention. Also was present in byondcord doing the same thing, as well as telling people to take estrogen. Boring tranny shit.MSO makes attention post on reddit calling coderbus trannyphobic, milk is implied.
View attachment 8796053
As this post is deleted, we need a humble kiwifag to fetch the milk in coderbus because my discord account is jannified until next week.