QUOTE(rizvanrp @ Aug 3 2010, 04:14 PM)
If you don't know what we mean by packet injection or you believe that packet injection automatically means server sided attacks you should stop talking about the issue cause you don't know what you're saying :/
When you want to alter the data being sent by an application you have the option to do it by manually editing the program executable with a debugger, wrapping the winsock send/recv functions and modifying the data en route in process memory or even doing it at the OS level by crafting your own Ethernet frames from scratch. None of this is illegal because it doesn't involve you breaking into the system/network on the receiving end.
The entire point was just to obfuscate the traffic enough so that it would get past the traffic shaping devices which are currently performing a MITM attack for basically all your HTTP traffic.
@developer
No need to talk more. I think you and I have different methods (since you mentioned headers) but we can always talk about it later on MSN or something

lets talk tonight at msn or something about the method you and me are applying.
QUOTE(vapeace @ Aug 3 2010, 04:17 PM)
i send him my msn, i think we all can have a discussion later,
BTW reduce this discussion about this PI, it will tested only and will not be posted here.. so there no need to worries or buthurt, should i say ?
already got your msn.
QUOTE(rizvanrp @ Aug 3 2010, 04:22 PM)
Thanks, I appreciate your VPN which you've been running for about 4 years now

Been recommending you to users who've PMed me.
---
And once again, packet injection is NOT illegal. The whole point is just to obfuscate the traffic so that the traffic shapers do not pick up on the blacklisted traffic. It still has to be readable by the system on the other end (the webserver you're downloading from) without affecting it at all.
there are someone who dont know much about it and start blabbering around and saying that's illegal. seems that i missed the fun.
QUOTE(rizvanrp @ Aug 3 2010, 04:26 PM)
It's funny how
some of you guys basically support burning down the TM HQ but this method is frowned upon. I wonder what you're going to do once TM caps your OpenVPN protocol traffic?
As though an ISP which is performing 24/7 MITM attacks on HTTP protocol traffic is so bloody legal. Have you ever stopped to wonder about user privacy issues? If they can monitor + throttle every HTTP GET/POST method based on the URL being passed, don't you think that can link those URLs to IP addresses?
talk about this 2nite on msn.
QUOTE(rizvanrp @ Aug 3 2010, 04:37 PM)
I guess. There are many programming and networking techniques that your daily applications use which were spawned from hacking techniques. People just don't understand them so they keep using it.
P2Pover uses ARP cache poisoning
GG uses spoofed UDP addressing + UDP NAT traversal
All your pirated games have noCD cracks which have been unpacked + modified in a debugger
I mention PI once and people go 'NUUU U GO JAIL'? Lol >_>
name it nicely then we call them as reverse engineering.