haii nml375
1st thing 1st verry sorry for the crosspost.
2nd thing is, can you redirect me to the post that you mention before..
i've try to search but i found lot of post by "user"
verry appreciate for your help before..
hai nml375 and blake,
i have try User tcl script to convert the "backdoor-script"
but still got nothing when i use the convert-result..
my bot still running to some strange channel..
the point is, still dont understand what the meaning of
this headache word..
As I wrote, the needed procs to "decrypt" this bad-boy is available in user's post. Once you got the dezip proc loaded, all you need to do is issue the dezip tcl command with the various strings that you'd like to decrypt..
I sure do hope that you don't actually intend to run this horrible piece of trojan/backdoor. Having your eggdrop joining some strange channels are the least of your concern, as it attempts to create a new owner's record, as well as replacing any command to list users in order to hide this... In the end, this bad-boy is written to allow it's author (or other malicious users) full access to your eggdrop, and the shell that is hosting it.