################################# # # # Wingate Spoofing On # # # # /////// /////// //////// # # // // // // # # // /////// // # # // // \\ // # # ////// // // //////// # # # # By: athor1ty of #ChronicWarez # # # # NEWNET # # 7/24/98 # ################################# Fair warning that this method can get you klined or even glined from an IRC server/network! ...Blah Blah Blah Now to the stuff that's interesting... This method of spoofing will only let you spoof certain ips on IRC. You will not be able to pick what domain you want like vhost spoofing, this method of spoofing is barley even spoofing at all, it's more like IRC bouncing. NOTE:I put this spoofing method on text format because most networks have already glined from networks and can detect wingate spoofs, but some networks might have not figured how to yet...heh TOOLS: *Domscan or WgateScan 2.2 (Found at http://www.warforge.com/dos/wingate.html) *IRC client (NON-*NIX Preferably mIRC or Pirch) Step 1 Get your domscan or WgateScan out (I'd use WgateScan cuz it searches for ip's for you, domscan is manual and you have to try each ip individually) ready for usage. Start DNSing people for their ip number. I'd usually dns the 24.xxx.xxx because cable modems usually have a wingate server running. After you get the ip, type it in the ip box on one of the scanners. Then start the scan, you don't have to configure anything. If you don't get an ip, keep scanning for more. Step 2 After you get the ip...type these steps into the edit box in the IRC client: /server xxx.xxx.xxx(IP Address) 23 Then you'll get a bunch of garbage like wingate in ascii characters /raw irc.dragondata.com(Irc server you want to connect to) 6667(port) The connecting sequence will appear /raw user (username) (emailaddress) (userID) (forgotwhatthiswasusedfor,justtypeX) Finally /raw nick (nickname) And there, you're now wingate spoofing...sucka! -athor1ty #ChronicWarez NEWNET