|
You last visited: Today at 05:09
Advertisement
Who sad that...
Discussion on Who sad that... within the Conquer Online 2 forum part of the MMORPGs category.
03/27/2008, 22:51
|
#1
|
elite*gold: 0
Join Date: Dec 2007
Posts: 189
Received Thanks: 21
|
Who sad that...
... there is a working proxy somewhere?
Talk! NOW!
|
|
|
03/27/2008, 23:11
|
#2
|
elite*gold: 0
Join Date: Jan 2008
Posts: 135
Received Thanks: 10
|
This would probably have been better to put into the hack page.
However, most proxys out there are private. One reason why is because so many people are leechers and never give credit. Just download and use.
|
|
|
03/27/2008, 23:53
|
#3
|
elite*gold: 0
Join Date: Dec 2007
Posts: 189
Received Thanks: 21
|
well one is the programmer , the other one cooks a bread for him... thats y we have credits
|
|
|
03/28/2008, 05:55
|
#4
|
elite*gold: 0
Join Date: Jun 2007
Posts: 1,272
Received Thanks: 246
|
there isnt even a proxy in the underground,no talk either 
CO seems dead latly
|
|
|
03/28/2008, 06:13
|
#5
|
elite*gold: 20
Join Date: Oct 2006
Posts: 2,707
Received Thanks: 2,525
|
they will give up eventually
CO will definitely change the decrypt if massive proxy arrives again
personally i dont think it is a hard thing to change the decrypt code compare to one has to figure out what is the decrypt code and create a encrypt program
and do u think they will spend another couple hundreds of hours trying to figure out if CO change the decryption again and again?
stick with memory bots and pixel bots are guaranteer working
|
|
|
03/28/2008, 06:46
|
#6
|
elite*gold: 0
Join Date: Aug 2007
Posts: 42
Received Thanks: 12
|
There is working bots (non-SV) I have seen a few teleporting botters in my server. I will say that the majority of proxies don't work now and I won't try to name what programs they are using to bot, becuase I don't know..
|
|
|
03/28/2008, 08:50
|
#7
|
elite*gold: 0
Join Date: Jul 2005
Posts: 1,892
Received Thanks: 345
|
im sad XD
|
|
|
03/28/2008, 09:45
|
#8
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
Quote:
Originally Posted by evanxxxm
they will give up eventually
CO will definitely change the decrypt if massive proxy arrives again
personally i dont think it is a hard thing to change the decrypt code compare to one has to figure out what is the decrypt code and create a encrypt program
and do u think they will spend another couple hundreds of hours trying to figure out if CO change the decryption again and again?
|
I really doubt they'll be hasty to change the encryption again if another proxy comes out. I mean, it's taken them years to do this, and the change they've made is tiny. It really isn't much work at all for someone who knows what they're doing. A good knowledge of ASM and few hours is all that's needed.
Encryption is an area where you stick to standards - for the developers, designing new encryptions is a no no. It takes much longer to design encryption than it does to crack it. They can change encyption keys and the like as often as they want, but it only takes a few minutes to find new keys.
Quote:
Originally Posted by ojojoj
well one is the programmer , the other one cooks a bread for him... thats y we have credits
|
Fuuuccckk. I wish someone would cook bread for me!
|
|
|
03/28/2008, 09:55
|
#9
|
elite*gold: 0
Join Date: Jun 2007
Posts: 1,272
Received Thanks: 246
|
Quote:
Originally Posted by unknownone
I really doubt they'll be hasty to change the encryption again if another proxy comes out. I mean, it's taken them years to do this, and the change they've made is tiny. It really isn't much work at all for someone who knows what they're doing. A good knowledge of ASM and few hours is all that's needed.
Encryption is an area where you stick to standards - for the developers, designing new encryptions is a no no. It takes much longer to design encryption than it does to crack it. They can change encyption keys and the like as often as they want, but it only takes a few minutes to find new keys.
Fuuuccckk. I wish someone would cook bread for me!
|
so does that mean you found out how the new keys are made?
anyway nice tosee you back in the CO section...your a legend
|
|
|
03/28/2008, 10:05
|
#10
|
elite*gold: 20
Join Date: Oct 2006
Posts: 2,707
Received Thanks: 2,525
|
unknownone@
if CO change key, they change
if people figure out, they figure
what does it mean "A good knowledge of ASM and few hours is all that's needed"?
it doesnt mean anything
its just like people saying, "well, a good programmer can easily make something similar or better than SV in few hours"
is that good programmer you? me? someone we know? someone that willing to spend time?
as simple as a AHK encrypter and a short 10 digit key
even a brute force program will take hours to do it (10^72+ possible combo)
(not considering if its sending to server, server will stop u)
yea sure, we can ask the "good knowledge ASM" guy, right?
the fact is that, the CID team does not succeed (yet or forever)
and if they succeed, and willing to release it to public. we will back to those massive proxy users days. CO team may or may not change the key/encryption, but if they do, is the CID team ready for another challenge?
using hundreds of hours and what do they get back?
some people yelling "VIRUS" or something "SUCKS, NOT WORKING"
or just a button of "thanks", o really great
(for details, u can check few pages inside the CID proxy thread)
sometimes for a programmer
input * 100 = outcome * 1
thats very discouraging
besides, seems like they get very little support from Underground. or maybe the fact is that no one in underground is such a "good ASM" guy that can figure the code out.
|
|
|
03/28/2008, 10:59
|
#11
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
The good knoweldge of ASM that is needed is to be able to read a section of code, interpret it and possibly convert it to a HLL for practical use. There's not even much code to reverse, it just looks more complicated than it actually is because of all the inline htonl() that it uses. Of course, bigger and more complex encryptions can take hours and hours to crack, but it's not the case with CO.
Brute forcing is only viable for destructive encryptions and hashes. Since the server needs to interpret the information in everything you send, it's not an option for a game protocol. The client contains the code and keys you need, finding and interpreting it is where you need a bit of time and knowledge of assembly language.
Thic CIDProxy team don't have that experience with assembly and debugging. They're not really experienced programmers, rather they've just gained their skill and knowledge by looking at existing hacks and modifying them etc. They're capable of doing much more than that, and I'm pretty sure they'll have the new encryption worked out soon enough. I'm being reluctant to help them so that they learn to do it themselves - that, and because I have no interest in playing or cracking CO anymore.
|
|
|
03/28/2008, 13:30
|
#12
|
elite*gold: 0
Join Date: Oct 2006
Posts: 619
Received Thanks: 40
|
im with evan on this one proxys are a waste of time :P
|
|
|
03/28/2008, 14:39
|
#13
|
elite*gold: 0
Join Date: Mar 2006
Posts: 583
Received Thanks: 182
|
eventually someone will, until then ill enjoy the game with no noobs using aimbots
|
|
|
03/28/2008, 16:06
|
#14
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
Quote:
Originally Posted by bossdude
im with evan on this one proxys are a waste of time :P
|
I think quite the oposite. Memory based bots need regular maintenance, usually after ever patch that modifies the game binary, unless the bot is well coded to adapt to smaller changed (Most are not, I see many pointing directly to specific addresses which do change after patches).
A proxy on the other hand, only needs maintenance when there's a big patch like this that changes the protocol. Proxies have been working for years without any changes until patch 5018.
Aside from the maintenance, there's plenty of other advantages to using a proxy that you can't do with simple pixle based or memory bots (although, a memory based packet editor will do the same thing). A proxy doesn't need to remain a proxy either - you can make completely stand alone bots from the same code base once you have the networking code in place. There's a few bot-checking jobs done by the server to check if the official client is in use, but they can be, and have been broken.
The people who made most of the original proxies - chocoman, qonquer, behelit, ultimation etc - are all capable of cracking new encryptions if need be, had they thought it was a difficult task they would've stuck to using memory based tools too.
|
|
|
03/28/2008, 17:22
|
#15
|
elite*gold: 20
Join Date: Oct 2006
Posts: 2,707
Received Thanks: 2,525
|
unknownone@
Quote:
|
The people who made most of the original proxies - chocoman, qonquer, behelit, ultimation etc - are all capable of cracking new encryptions if need be, had they thought it was a difficult task they would've stuck to using memory based tools too.
|
exactly, when the encryptions are easy, they can do it
when it is slightly complicated
1. give up (maybe dont even think it worths time cracking it)
2. Wait for other people to crack it, steal the method and create its own proxy
3. like now, trying, but seems no progress
i have nothing against proxy. i always think proxy are > other type of bots.
if the CID team can figure it out, for a noob programmer like me, i will also feel good that they can achieve something that normally cant
on the other hand, i also feel sorry for them because most people can not provide any help to them. not only that, but people are just whining about "HURRY UP" "WHEN IS IT COMING OUT" "IT SHOULD BE EASY, COME ON" and thats very discouraging to them
(at least thats what i get from your idea that they are no good ASM programmer, and if they were it should be piece of cake that can be done in few hours. i know that might be a true fact, but they are trying their best, so i think they deserve no complaints. thats why i got a little bit mad)
at the end, if they can figure out, but decided not to release it in public
i will also support that idea
from the feedbacks, time consuming and lack of "good" ASM knowledge, thats what holding them back.
of course, deciding whether or not it is "wasting time" or "enjoying" for cracking the encryption is totally depend on them.
|
|
|
All times are GMT +1. The time now is 05:10.
|
|