

I've noticed a packet which HEX prints "You have been banned from this server!". However, there is no point in dropping the packets with this length because the whole international and inbound channels are filled and the server still cannot be reached.Īlso the HEX of the packets contains a part of the server configuration. The most common length of the packets is 1400, but there are also less packets with different length. It comes from the server port, and almost always hits port 27005.

We know that the attack is made through the UDP protocol from hundreds of IPs that are real counter strike 1.6 servers (hlds). The attack is so strong that even Internet Service Providers say that it harms the connection of their users near the hlds server location. The attack originally started a month and a half ago in Bulgaria, and since then many big server chains are attacked and still no solution is found. This way all HLDS servers make an unstoppable "botnet" which can attack the destination which is chosen. Briefly, the exploit allows the attacker to send packets over every hlds server to a predefined destination. I am writing to inform you about a new very dangerous exploit in the HLDS engine. Здравствуйте! :D I can't speak Russian, so I will type in English.
