Editing Hacker

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
A '''hacker''', in terms of the [[JA]] and [[JO]] community, is a player who uses a third party program, or an [[exploit]] in the in-game engine to his/her advantage, which in turn gives the player a considerable edge against the majority of players. Hackers can also be classified as anyone who uses a third party program or an exploit in the in-game engine to disrupt game traffic, either by causing forced disconnection or server crashes.
A hacker, in terms of the [[JA]] and [[JO]] community, is a player who uses a third party program, or an [[exploit]] in the in-game engine to his/her advantage, which in turn gives the player a considerable edge against the majority of players. Hackers can also be classified as anyone who uses a third party program or an exploit in the in-game engine to disrupt game traffic, either by causing forced disconnection or server crashes.




Line 5: Line 5:
One of the most common hacks used by players are ''[[Script|scripts]]'', these scripts are easy to create and easy to use. These scripts can be made to do certain actions when executed, the common one being ''auto short hops'' and ''auto rolling/force''. Most servers do not provide a patch to stop these scripts from executing.
One of the most common hacks used by players are ''[[Script|scripts]]'', these scripts are easy to create and easy to use. These scripts can be made to do certain actions when executed, the common one being ''auto short hops'' and ''auto rolling/force''. Most servers do not provide a patch to stop these scripts from executing.


Another common form of hack tools are third party programs, usually created through C++. These tools usually require an injection of a certain [[exploit]] into the [[Q3]] [[engine]], which allows for the program to operate in-game. These include auto-aim programs such as [[Dark Side Tools]], and countless ESP hacks (hacks that display certain information such as health and shield info on the users HUD).
Another common form of hack tools are third party programs, usually created through C++. These tools usually require an injection of a certain [[exploit]] into the [[Q3]] [[engine]], which allows for the program to operate in-game. These include auto-aim programs such as [[Dark Side Tools]', and countless ESP hacks (hacks that display certain information such as health and shield info on the users HUD).


Many hacks are usually in-game exploits that were not patched since the [[JKA Version 1.01|1.01 update]]. The common ones are skin exploits and chat exploits. Skin exploits use a combination of 2 skins and the use of 2 scripts: A [[Lag|lag]] script and a bypass script. When the user exploits these scripts while using the corrupt [[skin]], any player that is close to, or facing the player will experience an error in the skin reading system and subsequently crash as a result. Skin exploits involve accessing the engines [[Chat|chat]] system to force it to send a text command to the [[server]], usually the command is masked so that it seems that another player is saying something that they are in fact, not saying anything. Commonly, this exploit is detected if regular chat overlaps the false chat, creating a clustered chat mix. Others include [[RCON]] blockers, which blocks legitimate Rcon commands by sending a mass volley of false ones and [[Fake Player]] Denial of Services, which sends false players to a [[server]] to overload it.
Many hacks are usually in-game exploits that were not patched since the [[JKA Version 1.01|1.01 update]]. The common ones are skin exploits and chat exploits. Skin exploits use a combination of 2 skins and the use of 2 scripts: A [[Lag|lag]] script and a bypass script. When the user exploits these scripts while using the corrupt [[skin]], any player that is close to, or facing the player will experience an error in the skin reading system and subsequently crash as a result. Skin exploits involve accessing the engines [[Chat|chat]] system to force it to send a text command to the [[server]], usually the command is masked so that it seems that another player is saying something that they are in fact, not saying anything. Commonly, this exploit is detected if regular chat overlaps the false chat, creating a clustered chat mix. Others include [[RCON]] blockers, which blocks legitimate Rcon commands by sending a mass volley of false ones and [[Fake Player]] Denial of Services, which sends false players to a [[server]] to overload it.


Another form of hacking, and one that poses a more dangerous threat to servers are [[DDoS|DDoS attacks]], which basically sends a large degree of [[false clients]] to a targeted server, this in turn overloads the sever and thus crashes it. This form of attack however, is the most easiest out of any other hack in [[JKA]] and [[JKO]]. For the most part, protection against these attacks are also easy to acquire, for many server providers have built in security which protects servers from third party attacks. Another form of [[DDoS]] is the [[getinfo]] exploit, which causes a buffer overload in the server. However, this again is easy to bypass.
Another form of hacking, and one that poses a more dangerous threat to servers are [[DDoS|DDoS attacks]], which basically sends a large degree of [[false clients]] to a targeted server, this in turn overloads the sever and thus crashes it. This form of attack however, is the most easiest out of any other hack in [[JKA]] and [[JKO]]. For the most part, protection against these attacks are also easy to acquire, for many server providers have built in security which protects servers from third party attacks. Another form of [[DDoS]] is the [[getinfo]] exploit, which causes a buffer overload in the server. However, this again is easy to bypass.
[[Category:Terms]]
Please note that all contributions to Jedi Knight Wiki | JKHub are considered to be released under the Public Domain (see JKHub:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To edit this page, please answer the question that appears below (more info):

Cancel Editing help (opens in new window)