From 6bff0077c8621f1968c7fa20d2c9867f6389940e Mon Sep 17 00:00:00 2001 From: Edo Date: Sun, 14 Nov 2021 18:54:00 +0000 Subject: [PATCH] Create README.md --- README.md | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 README.md diff --git a/README.md b/README.md new file mode 100644 index 0000000..0cda803 --- /dev/null +++ b/README.md @@ -0,0 +1,30 @@ +# MW3ServerFreezer +Remastered MW3 Server Freezer for the 1.4:382 version of the game (client). + +## Disclaimer + +This software has been created purely for the purposes of academic research. It is not intended to be used to attack other systems. Project maintainers are not responsible or liable for misuse of the software. Use responsibly. + +## Summary + +This software is a proof of concept for a vulnerability that is patched. You can't harm anyone with it if you use it on Pluto (If you were to update the addresses for the 1.9 patch). +You also can't use this vulnerability on Tekno as it was fixed last year (2.0.6 version of their client). +If you think your server is vulnerable you should seek help in the appropriate discord server or forum of the client you use. + +## Compile from source + +- Clone the Git repo. Do NOT download it as ZIP, that won't work. +- Update the submodules and run `premake5 vs2019` or simply use the delivered `generate.bat`. +- Visual Studio Properties -> Linker -> Input -> Module Definition File -> add module.def located in src folder +- Build via solution file in `build\mw3-server-freezer.sln`. + +## Commands + +List of hard-coded key binds: +- O Activate the exploit +- L Undo the exploit +- K Force disconnect from server (back to main menu) + +## Credits + +- QUADFOST posted the original exploit on a popular gaming forum. I wrote this software implementing the exploit.