How the Sofurry Christmas Exploit Works

Story by Tsociety on SoFurry

, ,

#3 of Code


Http requests

Http stands for HyperText Transfer Protocol, it requests a website for a page like say https://www.sofurry.com requests for Sofurry's home page and https://www.sofurry.com/view/1663598 requests a post, Sofurry tracks the views of a post by how many http requests the post gets. If you say enter https://www.sofurry.com/view/1663598 three times in three different tabs or browsers without even signing in, so furry will increase the view of that post by three, there may be a few missing views as not all http requests are processed fully to be counted as a view.

The Code

The code in the GitHub here or the Graphical User Interface version (private as still working out some bugs) here sends a http request to a website which if the website link is a post like https://www.sofurry.com/view/1663598 then it will add a view by sending a http request, the code does not stop by itself so if you want to stop it, you will have to quit the program or application running to stop it. The code creates http requests to the target website along with it being fairly slow makes it hard for the firewall to stop it as sometimes a firewall may think it is trying to attack the website and then ban the WiFi network the person is on making it unable to access the website as a safety feature. This code will send about 1 view every second it is active based on my computer but after testing on some other devices it can vary a bit more depending on the device's performance. Me and Caninehacker have a more powerful version of the code that can send around 60 views a second (at the expense of slowing down the entire website and making our computers an oven) which we will not be making public since a tool called HULK on github is capable of doing it at similar rates but also because it will probably make the website crash in the event that too many people use this tool.

Feel free to modify this tool however you like and use responsibly.