Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Conquer Online 2 > CO2 Programming
You last visited: Today at 03:23

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



memory based bots and proxies requirement questioning

Discussion on memory based bots and proxies requirement questioning within the CO2 Programming forum part of the Conquer Online 2 category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Sep 2012
Posts: 775
Received Thanks: 329
memory based bots and proxies requirement questioning

first of all ill try my best not to ask a stupid question so i don't get a sarcastic answer just try to be kind im working to get information too and not staying on my *** waiting for spoon feed

im studying reverse engineering (lena151 tuts and more tuts from all over the internet) , didn't give it a try at conquer.exe yet but i guess soon enough ill crack yet , i can manually unpack , i know about self modifying codes , also about protectors and packers but im not yet so good at reverse engineering but im working on getting better

i know much about c++ and c# , but i know nothing about networking and how to send and receive packets (only simple info like chatting msg and simple stuff like that) , also about encryptions , was trying simple stuff like ceaser enc. also umm simple enxor but didn't gone so far with others like dh (which tq use) , also never did try to write/read from memory to get in the memory based bots but i read alot about proxies and how they work with client and server

that's what i know , and what i don't know
and the question now , what do i need to start at any of them (memory based bots or proxies (maybe packets in general))
i need it like that
Quote:
proxies need good knowledge about
programming
  1. packets how to send and reserve
  2. encryptions dh
asm
  1. to get dh
  2. to stop tq client side protection
note : right now im searching and reading (some real helpful guides and posts by pro4never about proxies and more about memory based proxy from imhawtness and his link about Inject Your Code into Another Process ) thanks for u guys
so what i mean out of that is im not staying here only on my *** waiting for your help im working and searching , if u got helpful links and words please post them , if u got some sarcastic posts please keep them for yourself im already subscribed to just 4 laugh gages >.<
go for it is offline  
Thanks
1 User
Old 09/03/2012, 10:03   #2
 
elite*gold: 0
Join Date: Dec 2011
Posts: 1,537
Received Thanks: 785
#Duplicated my post...
I don't have a username is offline  
Thanks
1 User
Old 09/03/2012, 10:03   #3
 
elite*gold: 0
Join Date: Dec 2011
Posts: 1,537
Received Thanks: 785
I'm no help at reverse engineering, but network programming I'm sure I can help.

Try Google around and you could take a look at my Packet Analyzer (or wait for v3, because it'll be better.)

Also a few good links:









A proxy requires 3 (or more) sockets at all.
1 socket for connection between the server and your proxy.
1 socket for your proxy which is accepting connection.
1 socket for your client connection to your proxy.

Connection:
ProxySocket binds to en endpoint.
ProxySocket connects to the server.
--You login from your client
-- You'll get a connection to the ProxySocket.
ClientSocket should be equal to the socket connecting.

Packet Handling:
Client -> Packet -> Proxy
Proxy -> Packet -> Server

Server -> Packet -> Proxy
Proxy -> Packet -> Client

Basically a proxy is a middle man.
I don't have a username is offline  
Thanks
2 Users
Old 09/03/2012, 13:50   #4
 
elite*gold: 0
Join Date: Sep 2012
Posts: 775
Received Thanks: 329
im really thankful for you for not replying with sarcastic answer , your answer was more than awesome and im thankful for it , here is my conclusion

i need to work more on my reverse engineering to get the enc. key
meanwhile i also try to read about sockets and create a simple chat application using dhkey and then try to put a simple proxy in the middle as training
does that puts me on the right way ? thank you once more time

p.s thanks for the links ill bookmark them and read them one by one ^^
go for it is offline  
Thanks
1 User
Old 09/03/2012, 14:41   #5
 
elite*gold: 0
Join Date: Dec 2011
Posts: 1,537
Received Thanks: 785
It will indeed put you in the right direction. Keep it up
I don't have a username is offline  
Thanks
1 User
Old 09/04/2012, 17:55   #6
 
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,380
Quote:
Originally Posted by go for it View Post
im really thankful for you for not replying with sarcastic answer , your answer was more than awesome and im thankful for it , here is my conclusion

i need to work more on my reverse engineering to get the enc. key
meanwhile i also try to read about sockets and create a simple chat application using dhkey and then try to put a simple proxy in the middle as training
does that puts me on the right way ? thank you once more time

p.s thanks for the links ill bookmark them and read them one by one ^^
Just a suggestion... You'll get a bit more answers if you correct your terminology some.

DH is not an encryption. It refers to a key exchange algorithm which lets you 'securely' transmit a key across an unsecured connection in order to initialize whatever key based encryption system you wish to use for the rest of the session.

Conquer (last I checked, correct me if I'm wrong here guys) is using the CAST encryption algorithm. Before that it was using the Blowfish algorithm.

In your case this just means implementing an existing encryption library and then intercepting/modifying the DH exchange process using a man in the middle attack in order to set up the encryption as you wish it to work.

If you look again at my old proxy threads you'll find some more information on man in the middle attacks as well as the old DHExchange.


Your best bet for writing a proxy would be to look at CSV3 private server as it works on newer clients and therefor has fully working DHExchange and game encryption as part of it. The only thing you wont be able to do in this example is the password encryption which is not an issue unless you want to make a standalone bot.


Best of luck. Sounds like you have plenty of knowledge to complete this but it will be a fun learning project for you.
pro4never is offline  
Thanks
3 Users
Reply


Similar Threads Similar Threads
[Question] Memory based bot. How to start?
10/26/2012 - CO2 Programming - 31 Replies
Hello, in order to make my very own little bot, I tried differents ways. First, I made a pixel bot, it was a success for myself, I've added lots of features but because it was only a pixel bot, it wasn't really efficient and adding advanced functions were very very hard. After that, I tried to go further with another type of bot : proxies. The problem was, I was trying to code withtou basics knowledge and AutoIt is not really advised for that kind of bots. Thanks to pro4never, I achieved...
Both Proxy and Memory Based are Detectable now!!
07/02/2012 - CO2 Programming - 22 Replies
I thought only memory based program can be detected by the new anti bot but also including the proxy. I manage to fixed my proxy last night and I was jumping for happiness until my noob got a 1day banned. Damn their anti bot can detect both proxy and memory based program now. Probably because my proxy used some hooking on bypassing the client. Did anybody who has a private proxy also have same problem with me?
[SkillerSluwt]Memory based bot.
05/30/2009 - CO2 Bots & Macros - 140 Replies
SkillerSluwt What is SkillerSluwt? SkillerSluwt is a memory based bot, to put it simple, you can bot on an account without the need that client needs to have focus. SkillerSluwt has a range of skills that can be leveled with a click of a button, while you play on another account, sleep, eat breakfast or make love to your wife, or all at the same time for all i care. SkillerSluwt is easy to use, blonde proof, and moron free. SkillerSluwt is no racist, this Sluwt does what you want,...
memory based bot
08/17/2008 - Guild Wars - 28 Replies
hi hab nur ne kurze frage: und zwar ist es möglich, wenn man 2 accs hat einen memory based zB monk folis farmen lässt, und den anderen "normale" bot hfff farmen lässt? mit dem multi client kann ich schonma 2x guild wars starten, aber will sicher gehen, dass wenn ich mir nen 2ten bot kaufe, der auch keine probleme mit dem anderen bot macht.. ty schonma für die antworten:) MfG
Pattern based memory Search ?
12/26/2006 - General Coding - 3 Replies
Is there any tool that allows to search for patterns in memory ? All I tried (TSearch / Cheatengine) only allow you to search for one value or a fixed array of bytes. But I need a tool that lets me search for patterns, like XX XX 00 00 XX XX 00 00 while XX can be 00 to FF etc ?



All times are GMT +1. The time now is 03:24.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.