Quote:
Originally Posted by nafmuq
btw oriya, did you got to the duplicating part? were you creating the program for duplicating by the time you were offered? just wanna know how far youve gotten.
|
No. and I don't think I'm going to.
I don't normally do this kind of things, dupe exploit, the way I see it, is like gambling.
you spend a lot of time to find something profitable just so it could be fixed 2 days later.
and even if it's kept private in a very good manner, your profit is still bound to that exploit.
once it's fixed, your income is gone. and you never know when it will be fixed.
I focus on botting and botting-related things. it might not be as profitable as say, a dupe exploit... but it is pretty solid and steady.
Anyways, about the packet editor:
I've got an "Ok" from the Chinese to release such thing but there was still something missing, the GUI, and frankly I have no time to create a GUI if it's not CLR. whoever dealt with purely native windows before knows what I'm talking about.
so... I grabbed one of my old projects (for a different game) which had pretty solid, not good enough, but solid (feature-wise) PE.
the only problem was it's a .NET project. injecting a .NET DLL is fine, but since it's managed code, you can't do anything with it.
injecting such DLL is basically like injecting garbage into the game.
Luckily, we have nice NuGet packages such as DllExport which allows us to make the library treat certain functions as __declspec(dllexport) functions.
so I converted the encryption function to C#, hooked the needed functions and injected the DLL.
now, since it's all dllexport based, there is no entry point at all. but remotely calling a dllexport function is just fine.
so... quickly after injecting the DLL, the program is calling the "main" function of the DLL (simulating an entry point you could say).
From that point and on, it's pretty much the same with one exception:
you can't inject "Recv" (Server-to-Client) packets, only "Send" packets (Client-to-Server).
the reason behind it is that the function that is receiving the encrypted packet is decrypting the buffer
and having the switch statement too (the one to actually handle the packet).
there's no separate function for handling the packet. and that function is trying to grab the buffer off of a weird socket class.
with C++ that'd be easy to just call that function and jump the needed instructions (the encryption one) in real time and write the buffer pointer to the needed register.
But you can't read/write hardware registers with managed code.
.NET can't do that, the only real way to "inject" (it's not really injecting at that point) a "Recv" packet is by creating a bridge connection ("proxy") between the game and localhost.
this way, in theory, you could encrypt packets as if the server sent them and send them to the client via that socket and afterwards change the encryption key back to its previous value.
That being said, "Recv" packets are normally, and in most games fully, well.. useless (as they're clientsided).
unless the client is expecting a certain packet and will crash otherwise. but anything besides that is purely useless and can only be used for things like messing with your friends and saying things like "Hey look, I have 1B gold".
so no real harm done.
I might still work on it if it will be needed (by either creating that proxy or by going back to unmanaged code).
but from what I've seen so far, the client never actually expect a packet and never crashes because of such thing.
Anyways, I'm not going to say more as I'm really really tired and I barely wrote this post.
I will probably explain some of its features tomorrow, but for now I'll just leave the packet editor here for you guys to try out.
put both files in your AK folder and run AKPE.exe, it will automatically start the launcher.
login like your normally do and the PE window should appear once the game launches. if the launcher/game crash during launch, just try again.
multiclient is integrated in this PE, so you can try things like trades and such with two accounts.
P.S
Please excuse any misspells, as I said, I'm really really tired and I'm pretty sure I've had plenty hehe.
Good luck finding profitable exploits! :)
Oriya.
Edit:
Reported to be abused not only on the official servers but also in private servers.
all development is currently suspended and download has been removed.
please refer to this post for more information:
[Only registered and activated users can see links. Click Here To Register...]