hi once again, jack spratts....i think i see your point...
for those of you a little lost ...here is the story
I found a flaw in the KaZaA technology a vulnerability if you will
and an "exploit" which up till now i've yet to share but will now do so.
Here is the exploit:
Tools you will Need
GetRight (version 4p3 works great for me)
Latest Version of KaZaA/Klite/Grokster
How its done.
Try this simple tutorial first and once you get the hang of it
use it to amuse your friends...hell make a java or perl script
to automate the process...
okay here goes
First thing you will need to know is an ip address for a supernode
How to find a supernode? simple just use the getright webbrowser to connect to this address (while running KaZaA/Grokster or K-Lite)
http://127.0.0.1:1214
See all the great information you get?
Here is what I got when I connected to my port 1214 with the Getright webbrowser (with KaZaA up and running and connected to the fasttrack network)
Connecting to: 127.0.0.1
GET / HTTP/1.1
Host: 127.0.0.1:1214
Range: bytes=0-
User-Agent: X-Kazaa-Network: ???
Accept: *.*, */*
HTTP/1.1 200 OK
Content-Length: 5292
Accept-Ranges: bytes
Date: Sat, 04 May 2002 06:17:52 GMT
Server: KazaaClient Mar 30 2002 23:23:10
Connection: close
Last-Modified: Sat, 04 May 2002 06:17:52 GMT
X-Kazaa-Username: Shellybelly
X-Kazaa-Network: KaZaA
X-Kazaa-IP: 67.226.238.91:1214
X-Kazaa-SupernodeIP: 68.9.104.199:1214
Content-Type: text/html
(Got 55 files in web page http://127.0.0.1/.)
As you can see in the example (real example) above I am connected to the supernode ip address of
68.9.104.199:1214
So that is how you get your first supernode ip address...check out the picture I am attaching.