|
You last visited: Today at 14:02
Advertisement
Prerequisite knowledge for the creation of a decent proxy-based bot.
Discussion on Prerequisite knowledge for the creation of a decent proxy-based bot. within the CO2 Programming forum part of the Conquer Online 2 category.
10/08/2013, 09:06
|
#1
|
elite*gold: 0
Join Date: Mar 2009
Posts: 518
Received Thanks: 238
|
Prerequisite knowledge for the creation of a decent proxy-based bot.
Before you ask, yes, I have read the sticky, as well as the publicly available information about the subject. I am curious to know though, what exactly I should be thoroughly familiar with in order to be able to put together any kind of decent proxy-based bot (something along the lines of SirHooks, RIP Clinton). A general overview, or any information at all, would be much appreciated.
Thank you,
DBM
|
|
|
10/08/2013, 19:43
|
#2
|
elite*gold: 0
Join Date: Mar 2013
Posts: 118
Received Thanks: 95
|
Quote:
Originally Posted by DeathByMoogles
(something along the lines of SirHooks, RIP Clinton).
|
What? Clinton didn't die...
|
|
|
10/08/2013, 21:54
|
#3
|
elite*gold: 0
Join Date: Mar 2009
Posts: 518
Received Thanks: 238
|
Quote:
Originally Posted by Smaehtin
What? Clinton didn't die...
|
No, but he quit actively developing for CO.
|
|
|
10/08/2013, 22:16
|
#4
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
|
Ollydbg/Reverse engineering
General knowledge of cryptography
General knowledge of networked communications (sockets, packets, etcetc)
Strong logical thinking (creating bot logic, reverse engineering game systems and hack protection, etc)
Intermediate programming skills in any programming language. C++, C#, Java, etcetc are all just fine. I do not recommend trying with any 'scripting' languages as they will be more trouble then they are worth.
All of the existing guides and open source proxies (such as my proxy paradise tutorials) are all still relevant but you now need to be able to do the digging to update them. This means reverse engineering and ollydbg experience to get yourself the required information to update the projects or use them as a template for your own project.
|
|
|
10/09/2013, 04:50
|
#5
|
elite*gold: 0
Join Date: Mar 2009
Posts: 518
Received Thanks: 238
|
Thanks, P4N, much appreciated. *Sigh* I guess I'm off to learn Assembly, and then enhance C++/C# skills. Long journey ahead...
|
|
|
10/09/2013, 08:00
|
#6
|
elite*gold: 0
Join Date: Apr 2009
Posts: 133
Received Thanks: 96
|
Quote:
Originally Posted by DeathByMoogles
Thanks, P4N, much appreciated. *Sigh* I guess I'm off to learn Assembly, and then enhance C++/C# skills. Long journey ahead...
|
Assembly is not required, although it can be useful. and you don't need to know c++ and C#, just one is good enough. They can both do the job.
|
|
|
10/09/2013, 13:03
|
#7
|
elite*gold: 0
Join Date: Mar 2013
Posts: 118
Received Thanks: 95
|
Quote:
Originally Posted by DeathByMoogles
No, but he quit actively developing for CO.
|
Oh, right. By the way, SirHooks wasn't a proxy at all, it was a memory-based bot, hence the "Hooks" in the name .
|
|
|
10/09/2013, 23:01
|
#8
|
elite*gold: 0
Join Date: Mar 2009
Posts: 518
Received Thanks: 238
|
Quote:
Originally Posted by nicolastyler
Assembly is not required, although it can be useful. and you don't need to know c++ and C#, just one is good enough. They can both do the job.
|
Really? I was under the impression that in order to become proficient in OllyDbg and packet manipulation one had to have an elementary knowledge of inline ASM in order to fathom what exactly it is one is looking at. I wouldn't know though, so I could be completely mistaken.
As for C++/C#, I meant to reference them in an either/or fashion. My apologies, I suppose I should have made that more clear.
Quote:
Originally Posted by Smaehtin
Oh, right. By the way, SirHooks wasn't a proxy at all, it was a memory-based bot, hence the "Hooks" in the name .
|
Really? I actually find that quite surprising. I assumed it had to be a proxy because I have never encountered a memory-based bot that was able to attack as fast as SirHooks. Did it store the monsters' coordinates in some kind of array and then iterate through it? Always was curious about the secret to its speed...
|
|
|
10/09/2013, 23:07
|
#9
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
|
Quote:
Originally Posted by DeathByMoogles
Really? I actually find that quite surprising. I assumed it had to be a proxy because I have never encountered a memory-based bot that was able to attack as fast as SirHooks. Did it store the monsters' coordinates in some kind of array and then iterate through it? Always was curious about the secret to its speed...
|
Just because it's memory based doesn't mean it's more limited.
Hook based bots do everything proxies do without having to fiddle with encryption at all. I'd actually suggest hooking the send/receive function of the client and tada! You have a fully working packet sniffer which can then be used to spoof packets to the client or to the server (exactly what a proxy does)
You can also read or control the client through extra hooks but they are all optional and for simplicity sake and not actually required.
I suggest looking at the existing frameworks as a guideline of how bots CAN work but there's no reason to not go with a hook based approach.
Quote:
Originally Posted by nicolastyler
Assembly is not required, although it can be useful. and you don't need to know c++ and C#, just one is good enough. They can both do the job.
|
Without a decent knowledge of assembly how are you going to reverse engineer anything? Olly is useful for breakpointing and tracking down things but you still need to know what you're looking at if you want to re-write it or reverse engineer it.
This is even more important if you want to move towards a proxy based approach where you'll be required to reverse engineer much of the clients protection as well as cryptography.
|
|
|
10/10/2013, 00:30
|
#10
|
elite*gold: 0
Join Date: Sep 2006
Posts: 774
Received Thanks: 8,576
|
Quote:
Originally Posted by pro4never
Just because it's memory based doesn't mean it's more limited.
Hook based bots do everything proxies do without having to fiddle with encryption at all. I'd actually suggest hooking the send/receive function of the client and tada! You have a fully working packet sniffer which can then be used to spoof packets to the client or to the server (exactly what a proxy does)
You can also read or control the client through extra hooks but they are all optional and for simplicity sake and not actually required.
I suggest looking at the existing frameworks as a guideline of how bots CAN work but there's no reason to not go with a hook based approach.
Without a decent knowledge of assembly how are you going to reverse engineer anything? Olly is useful for breakpointing and tracking down things but you still need to know what you're looking at if you want to re-write it or reverse engineer it.
This is even more important if you want to move towards a proxy based approach where you'll be required to reverse engineer much of the clients protection as well as cryptography.
|
It isn't all that simple now with the increased "security". You have to know how to deal with their anti-cheat system or you will just get banned. So you can't use traditional hooks (unless you manage to disable their AC).
|
|
|
10/10/2013, 01:16
|
#11
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
|
Quote:
Originally Posted by phize
It isn't all that simple now with the increased "security". You have to know how to deal with their anti-cheat system or you will just get banned. So you can't use traditional hooks (unless you manage to disable their AC).
|
Which is why I suggested a decent background in assembly and reverse engineering.
The same could be said about proxies as you still need to override certain client functionality via hooks to set the login server IP. I'd assume the same protection would get you banned for using coloader in new patches.
|
|
|
10/10/2013, 06:47
|
#12
|
elite*gold: 0
Join Date: Mar 2009
Posts: 518
Received Thanks: 238
|
Quote:
Originally Posted by pro4never
Which is why I suggested a decent background in assembly and reverse engineering.
The same could be said about proxies as you still need to override certain client functionality via hooks to set the login server IP. I'd assume the same protection would get you banned for using coloader in new patches.
|
Oh joy, sounds like I have a lot of fun ahead of me...
Anyways, thank you all for the responses so far! They are much appreciated.
Edit: I found this, could any of you more experienced coders tell me whether or not this will be helpful?
Edit2: Would appreciate any links/ebooks that deal specifically with game networking/client-server packets and reverse engineering. These would help me tremendously!
Edit3: Also, my attempts to resend basic packets (e.g. saying "test", jumping once) all end in immediate disconnects, leading me to believe I'm going to have to hook into the client or route my connection through a proxy in order to run even basic tests. Oh joy, once more.
|
|
|
|
Similar Threads
|
EUW | Gold Division Elo | 2 Skins | decent champions | decent runes
02/18/2013 - League of Legends Trading - 0 Replies
Euw account with gold division. Has around 50+/- champs and 2 skins. The acc also has a free transfer to EUNE or turkey server. For more information or if you're intersted in the account.. Pm me here Or message me at skype : Freshkid47
|
decent/good miner, and decent PvE. 5.5M SP
06/16/2012 - Eve Online Trading - 2 Replies
This is the account up for sale.
eveboard - Abbigale Nova
She CAN pilot a Hulk, She just doesn't own one because of Hulkageddon and what not.
She will come with no isk (other then whatever ends up selling that's up on the market right now, a few mil worth of stuff, I believe)
She will come with a fully fitted Retriever for mining, a second retriever in a small pocket of high sec surrounded by low and null (if you want to risk flying out there for it to sell, or use, or whatever),...
|
Combat Arms Hacker Voraussetzung/Prerequisite
12/09/2011 - Combat Arms - 3 Replies
Hallo ,
ich will mich im hacken von Combat Arms versuchen.
Manche Kenntnisse besitze ich bereits , z.B. C++.
Ich möchte wissen was ich benötige um CA erfolgreich
zu hacken.
|
prerequisite requirements for wall hacks and for slow loading of SF game
10/19/2010 - Soldier Front Hacks, Bots, Cheats & Exploits - 13 Replies
Here are some steps to follow
The simple way
if you are playing in a computer shop ask assistance from their crew
never install anything without their permission
otherwise you will be responsible with it
assuming SF game is installed
*** Install this
|
Enter Halls of Reflection without prerequisite.
12/14/2009 - WoW Exploits, Hacks, Tools & Macros - 0 Replies
To enter the Halls of Reflection and play the instance you will need to attune yourself by doing 2 previous prerequisite quests in the Forge of souls and Pit of Saron.
Or, you can open the new LFG, Select HoR specifically and wait for a random group. Upon entering chances are the event won't start, just have your party reset the instance a few times (Pref don't tell them you haven't done the prerequisite), and the event should start.
Completed this morning before I knew there was a...
|
All times are GMT +2. The time now is 14:02.
|
|