Wurst.Wiki

The Official Wurst Client Wiki

User Tools

Site Tools


forceop

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
forceop [2022/11/05 20:54] – Add ForceOP page from old wiki alexander01998forceop [2024/10/09 09:22] (current) alexander01998
Line 1: Line 1:
 ====== ForceOP (AuthMe Cracker) ====== ====== ForceOP (AuthMe Cracker) ======
 +<WRAP center round important>
 +ForceOP requires a **[[cracked server]]** with **AuthMe** or a similar plugin. It will not work without this. You cannot ignore this step.
 +</WRAP>
  
 ===== Overview ===== ===== Overview =====
Line 7: Line 10:
 ===== How To Use ===== ===== How To Use =====
  
-==== What you need ==== +**You will need:**
- +
-  * **A cracked server** with AuthMe or a similar plugin. [[http://www.planetminecraft.com/blog/offline-modecracked-servers---what-are-they/|What's that?]]+
  
 +  * **A [[cracked server]]** with AuthMe or a similar plugin.
   * **The usernames** of as many admins as you can get.   * **The usernames** of as many admins as you can get.
  
Line 23: Line 25:
 Now leave the server, go to the AltManager and log in as one of the admins. Then join the server again and turn ForceOP/AuthMeCracker on. A frame with options will open: Now leave the server, go to the AltManager and log in as one of the admins. Then join the server again and turn ForceOP/AuthMeCracker on. A frame with options will open:
  
-{{:forceop2.webp|screenshot of the AuthMeCracker GUI}}+[{{:forceop2.webp|screenshot of the AuthMeCracker GUI}}]
  
 If you just leave everything as it is, it will try the username and 49 other common AuthMe passwords at a speed of 1 password per second. This takes up to about a minute and has a chance of about 10% to work because about 10% of all users use one of these passwords. In most cases, this configuration will give you the best results. If you just leave everything as it is, it will try the username and 49 other common AuthMe passwords at a speed of 1 password per second. This takes up to about a minute and has a chance of about 10% to work because about 10% of all users use one of these passwords. In most cases, this configuration will give you the best results.
Line 43: Line 45:
 When you're done with the options, click the ''Start'' button and wait until it's done. If you get kicked for ''Login timeout!'', just reconnect or turn [[AutoReconnect]] on. If you get kicked and temporarily banned for ''Too many failed attempts. You are temporarily denied to join this server.'', it is patched on that server. When it's done, you will get a Wurst message that either starts with "**<color #f55>[</color><color #fa0>Wurst</color><color #f55>]</color> <color #5f5>[</color><color #0a0>SUCCESS</color><color #5f5>]</color>**" or "**<color #f55>[</color><color #fa0>Wurst</color><color #f55>]</color> <color #f55>[</color><color #a00>FAILURE</color><color #f55>]</color>**". When you're done with the options, click the ''Start'' button and wait until it's done. If you get kicked for ''Login timeout!'', just reconnect or turn [[AutoReconnect]] on. If you get kicked and temporarily banned for ''Too many failed attempts. You are temporarily denied to join this server.'', it is patched on that server. When it's done, you will get a Wurst message that either starts with "**<color #f55>[</color><color #fa0>Wurst</color><color #f55>]</color> <color #5f5>[</color><color #0a0>SUCCESS</color><color #5f5>]</color>**" or "**<color #f55>[</color><color #fa0>Wurst</color><color #f55>]</color> <color #f55>[</color><color #a00>FAILURE</color><color #f55>]</color>**".
  
-[{{:forceop1.webp|The success message in older versions. It was changed in Wurst v1.1 and now says: "**<color #f55>[</color><color #fa0>Wurst</color><color #f55>]</color> <color #5f5>[</color><color #0a0>SUCCESS</color><color #5f5>]</color> The password "password" worked.**"}}]+[{{:forceop1.webp|The success message in older versions. It was changed in [[update:Wurst 1.1]] and now says: "**<color #f55>[</color><color #fa0>Wurst</color><color #f55>]</color> <color #5f5>[</color><color #0a0>SUCCESS</color><color #5f5>]</color> The password "password" worked.**"}}]
  
 If you got a success message that tells you the AuthMe password, you have successfully bypassed the AuthMe protection of that admin. You might not see this message right after the first try. That's why you collected several usernames. Just repeat this process with the other usernames that you collected until you find one that works. If you got a success message that tells you the AuthMe password, you have successfully bypassed the AuthMe protection of that admin. You might not see this message right after the first try. That's why you collected several usernames. Just repeat this process with the other usernames that you collected until you find one that works.
Line 51: Line 53:
 ===== Tips ===== ===== Tips =====
  
-**Turn [[AntiSpam]] on** and you won't see all the annoying "**<color #a00>Wrong password!</color>**" messages from AuthMe. +  * **Turn on [[AntiSpam]]** and you won't see all the annoying "**<color #a00>Wrong password!</color>**" messages from AuthMe. 
- +  You can also **do this with normal users** to get access to their plots, items, etc.
-You can also **do this with normal users** to get access to their plots, items, etc.+
  
 +{{tag>force_op griefing}}
 ---- struct data ---- ---- struct data ----
 +hack.name            : ForceOP
 +hack.image           : 
 +hack.category        : chat
 +hack.in-game description : Cracks AuthMe passwords.\\ Can be used to get OP.
 +hack.default keybind : none
 +hack.source code     : net/wurstclient/hacks/ForceOpHack.java, net/wurstclient/util/ForceOpDialog.java
 ---- ----
  
forceop.1667681679.txt.gz · Last modified: 2022/11/05 20:54 by alexander01998