"Minecraft" hacker ravage "2B2T" server for 3 years with vulnerability tracking players destroyed thousands of bases

" minecraft " has a large online community, there are many unrequently managed "No Government Servo", "2B2T" (2 Builders 2 Tools) is definitely one of the most unimpeded servors. It is often called "digital desert", not only does not have any rules and restrictions, but also has a map of TB size, from 2010, it has not been reset so far. There are many players in the forehead, often deal with each other through hackers and vulnerabilities, and steal new players's props, and do everything around causing various confusion.

Although there is no rule, players can be unscrupulous, but sometimes players use vulnerabilities to be too exceeded, and the server's management will still intervene in the overall server and the community. In recent years 2B2T, because a serious vulnerability leads to a large number of players to choose to leave.

Returning to 2018, there are two players to find soft "Papermc" vulnerabilities, the original function is used to repair or improve the abnormality of the online server, but the vulnerability will allow the server to misunderstand the block position of the player, even if not Squares in the field of view will also be judged. As a result, the server is therefore simultaneously read a large number of 16x16 blocks, which are directly overloaded and machine.

Players who have found that vulnerabilities think that it will make administrators or Papermc developers to make up their contributions and reinforcement for vulnerabilities. In the end, this idea is really a test, and PaperMC quickly repairs related issues, but other potential risks are also derived.

Although the modified Papermc will not let the server read a lot of blocks, it will first detect the location of the player, and then respond to the square clicks on the player, in other than the detection method, the player is exposed.

From 2018 to 2019, the team named Nerds Inc. began to abuse the repaired Papermc View the server where there is player, and record the position on the chart, then steals or destroy the props and base in the block. The vulnerability finally became the "Nocom" of the 2B2T player familiarity, where the players who found that the Papermc vulnerability also joined Nerds Inc..

However, based on the server itself, all players usually hide the base and props to avoid deliberate destruction, so Nerds Inc. can lock the player without error to lock the player in a panic.

Returning to Tree of Savior in 2020.. Is It Worth Starting? In order to eliminate suspicion, members of Nerds Inc. even penetrate to 2B2T reddit discussion and discord , trying to convince others to lock the player's vulnerability does not exist. This strategy works smoothly, temporarily comforting 2B2T players.

Time to 2020, the team still continues to mess, even the network of vertical designers to consolidate team strength, by the way, so that the team can detect more detailed behavior information in blocks, and immediately judge the players in the block The location, even subtle to discriminate details of the box, the demolith box, building materials.

With a more cheating vulnerability, the team arrived until 2021 to the entire server, there is a base to be blown everywhere, and a large number of players returned to the report, and the community is again trapped again, and finally, I almost play 2B2T. Because Nerds Inc. knows that the administrator will always completely block the evils from the team, it is increasing the size of the corruption from June and July this year. The final administrator restrictions the size of the information that the account is transmitted in the server, and the incident is completely ended.

Although all the dust is set, there have been thousands of players, and 15,000 bases are destroyed or recorded in the team database. The number of props that is stealing is more than 200 million, and the remaining wave that must be brought by Nocom will still Missing many players are happy to hang for a while.

Reference Original: windows Central

Comments