public static void smethod_0(byte[] byte_0) { bool flag = false; Class13 @class = new Class13(byte_0); Class28.smethod_2(@class.Int32_1, byte_0); Class1.class11_0.method_6(byte_0); if (Class17.bool_0) { switch (Class17.short_0) { case 0: Class1.string_3 = @class.method_0(); Class28.smethod_4("Working for " + Class1.string_3); break; case 1: { Class17.int_1 = @class.Int32_1; Class14 class2 = new Class14(Class17.int_1); class2.method_3(Class24.class23_3.method_4().ToLower()); Class1.class19_0.method_8(class2.method_5()); Class28.smethod_3("Pwned Server Security! Sent custom keys! 8-)"); Class17.bool_0 = false; flag = true; break; } } Class17.short_0 += 1; } if (!flag) { byte[] byte_ = @class.method_3(); Class1.class19_0.method_8(byte_); } }
// Token: 0x060004F4 RID: 1268 RVA: 0x000293E0 File Offset: 0x000275E0 private int method_11(char[] char_2, int int_1, int int_2) { int i = int_2; if (this.byte_1 == null) { this.byte_1 = new byte[128]; } while (i > 0) { int num = i; if (this.bool_0) { num <<= 1; } if (num > 128) { num = 128; } int chars; if (this.bool_1) { Class13 @class = (Class13)this.class11_0; int byteIndex = @class.method_3(); num = @class.method_4(num); if (num == 0) { return(int_2 - i); } chars = this.decoder_0.GetChars(@class.method_1(), byteIndex, num, char_2, int_1); } else { num = this.class11_0.vmethod_11(this.byte_1, 0, num); if (num == 0) { return(int_2 - i); } chars = this.decoder_0.GetChars(this.byte_1, 0, num, char_2, int_1); } i -= chars; int_1 += chars; } return(int_2); }
public static void smethod_1(byte[] byte_0) { bool flag = false; Class13 @class = new Class13(byte_0); Class28.smethod_0(@class.Int32_1, byte_0); Class1.class11_0.method_5(byte_0); if (Class17.bool_1) { switch (Class17.short_1) { case 0: { Class17.int_0 = @class.Int32_1; string string_ = @class.method_0(); Class24.smethod_1(string_); Class14 class2 = new Class14(Class17.int_0); class2.method_3(Class24.string_1); class2.method_2(false); flag = true; Class1.class19_0.method_7(class2.method_5()); Class28.smethod_4("Wait for banner exploit sulake 8-)"); break; } case 1: { Class17.int_2 = @class.Int32_1; Class24.smethod_2(@class.method_0()); Class14 class3 = new Class14(Class17.int_2); class3.method_3("1"); Class1.class19_0.method_7(class3.method_5()); Class24.class25_1 = new Class25(); Class24.class25_1.method_0(new byte[] { 1 }); while (!Class24.class25_1.bool_0) { } Class17.bool_1 = false; flag = true; Class28.smethod_4("Pwned Client Security! Sent pwned data to client 8-)"); break; } } Class17.short_1 += 1; } if (!flag) { byte[] byte_ = @class.method_3(); Class1.class19_0.method_7(byte_); } }