Good evening,
As some people may have heard by now on this game a secret logging system represents the most powerful weapon against hackers.
The main issue I hope to cover here is how logs look like and what's being logged.
What's being logged:
Secret KOMCheck algorithm:
Exactly as the name suggests the client runs a secret, hidden KOMCheck method/algorithm that checks KOM files.
This KOMCheck method/algorithm:
-Is incorporated in the game's client,
-Does not need files from the internet (non-bypassable),
-Only reports when the normal KOMCheck and this second method give different results (i.e. when the normal KOMCheck has been bypassed),
-Does not close the client but each time it detects a modified KOM file an entry in the login packet is sent to the server.
This is how admins can find out if you have a modded client and since the alteration of the client is strictly forbidden by T&C you can legitly get banned even if you don't have any abnormal logs.
Example: bans took for voice mods follow this system.
Solution:
Basically, you don't have to edit KOM files.
Programs like [Only registered and activated users can see links. Click Here To Register...] , ELX or Cheatengine can alterate the in-game experience without making modifications in the structure of the KOM.
Special thanks to Joni-St who analised the client binary and made this descovery.
Safe way to hack based on IP change:
I'm a hacker and I'm in big trouble, what should I do?
What I want to add:
These are only my ideas on how to evade security. Based on the presented info about logs you may come up with better solutions. Do whatever you decide to do and keep in mind that variety will save your ass.
Prints:
I had more but I've lost them when my old hard-disk broke. Some info here can be confirmed not only by me but also by any hacker who made a ticket after getting banned.
That's all, I hope this topic helps people understand how things work. Also feel free to update my list with anything useful that's not already been told.
As some people may have heard by now on this game a secret logging system represents the most powerful weapon against hackers.
The main issue I hope to cover here is how logs look like and what's being logged.
What's being logged:
- The level of your character as well as the dungeon you're playing in. For example: you can’t access x-2 secret dungeon at lv 6 unless you are a hacker.
- Drops of all kind: ED and items acquired.
- All dungeon results: for example how much ED/ Exp you have acquired, clear time, etc.
- How many mobs you have killed during the respective run.
- What stages you clear during the run.
- How much damage you deal. By knowing this we can assume that they also know how much dmg you receive or if you receive anything at all.
- Based on the value and particularities of the damage you have dealt or received they might be able to guess about how much: phy/mag attack/defence, add.dmg, crit, red.dmg and evasion, you have. What I can say for sure is that when you kill a mob they know exactly how much damage you have dealt and if it was a critical hit or not.
- Since they know if mobs receive damage or not they also know by what means dies a mob.
- They know how many accounts you have by tracking your IP. Every account you have ever accesed with your IP(even once) is counted as " one of your accounts". This is how many innocents get banned when a hacker gets banned on IP.
- They log trades of all kind: mail, direct, board. They know what item you trade.
- They know from which account to which account goes the item you have send. They recognize accounts not only by IP but also by name. As simple as: account "x" is trading with account "y".
- They know the exact date of all logs. Year,month,week,day,hour,minute. Logs have a length in time of 5 or more months which makes me believe that logs never get deleted.
- Logs are stored in your account's history. In other words your account is "the main villain" not your characters - deleting or renaming a character is pointles since logs remain on your account's history.
- Mods are detectable and bannable.
- They have a list of all items you have on your account and their effects/particularities. They know which items[gear, costumes, accessories] you have used during a run and their characteristics[enhancement, effects & sockets].
Secret KOMCheck algorithm:
Exactly as the name suggests the client runs a secret, hidden KOMCheck method/algorithm that checks KOM files.
This KOMCheck method/algorithm:
-Is incorporated in the game's client,
-Does not need files from the internet (non-bypassable),
-Only reports when the normal KOMCheck and this second method give different results (i.e. when the normal KOMCheck has been bypassed),
-Does not close the client but each time it detects a modified KOM file an entry in the login packet is sent to the server.
This is how admins can find out if you have a modded client and since the alteration of the client is strictly forbidden by T&C you can legitly get banned even if you don't have any abnormal logs.
Example: bans took for voice mods follow this system.
Solution:
Basically, you don't have to edit KOM files.
Programs like [Only registered and activated users can see links. Click Here To Register...] , ELX or Cheatengine can alterate the in-game experience without making modifications in the structure of the KOM.
Special thanks to Joni-St who analised the client binary and made this descovery.
Safe way to hack based on IP change:
I'm a hacker and I'm in big trouble, what should I do?
What I want to add:
These are only my ideas on how to evade security. Based on the presented info about logs you may come up with better solutions. Do whatever you decide to do and keep in mind that variety will save your ass.
Prints:
I had more but I've lost them when my old hard-disk broke. Some info here can be confirmed not only by me but also by any hacker who made a ticket after getting banned.
That's all, I hope this topic helps people understand how things work. Also feel free to update my list with anything useful that's not already been told.