|
You last visited: Today at 16:50
Advertisement
Client SQL Injection
Discussion on Client SQL Injection within the Flyff Private Server forum part of the Flyff category.
07/18/2015, 14:03
|
#1
|
elite*gold: 0
Join Date: Dec 2008
Posts: 306
Received Thanks: 59
|
Client SQL Injection
Is there anyway to inject from neuz client.
because my server is broke down from hacker (no website but he still can inject)
|
|
|
07/18/2015, 14:15
|
#2
|
elite*gold: 0
Join Date: Jan 2009
Posts: 1,741
Received Thanks: 1,674
|
As far as I know, there is/was a vulnerability in the Certifier, mootie posted something about that a few months/years ago.
|
|
|
07/18/2015, 14:16
|
#3
|
elite*gold: 0
Join Date: Apr 2010
Posts: 82
Received Thanks: 27
|
Guild Name ?
Backdoor ?
Add Friend ?
New Char ?
|
|
|
07/18/2015, 14:26
|
#4
|
elite*gold: 0
Join Date: Dec 2008
Posts: 306
Received Thanks: 59
|
Quote:
Originally Posted by Meutledaron
Guild Name ?
Backdoor ?
Add Friend ?
New Char ?
|
I'm use blessed source.
|
|
|
07/19/2015, 18:40
|
#5
|
elite*gold: 0
Join Date: Jul 2015
Posts: 181
Received Thanks: 199
|
Use this ar.cpp if your not already.
Code:
// String format:
// UNICODE strings are always prefixed by 0xff, 0xfffe
// if < 0xff chars: len:BYTE, TCHAR chars
// if >= 0xff characters: 0xff, len:WORD, TCHAR chars
// if >= 0xfffe characters: 0xff, 0xffff, len:DWORD, TCHARs
#include "StdAfx.h"
#include "Ar.h"
#ifdef __VM_0819
CHeapMng* CAr::m_pHeapMng = new CHeapMng( "CAr" );
#else // __VM_0819
CHeapMng* CAr::m_pHeapMng = new CHeapMng;
#endif // __VM_0819
CAr::CAr( void* lpBuf, u_int nBufSize )
{
if( lpBuf )
{
m_nMode = load;
m_lpBufStart = (LPBYTE)lpBuf;
m_nBufSize = nBufSize;
}
else
{
m_nMode = store;
m_lpBufStart = m_lpBuf;
m_nBufSize = nGrowSize;
}
m_lpBufMax = m_lpBufStart + m_nBufSize;
m_lpBufCur = m_lpBufStart;
}
CAr::~CAr()
{
if( IsStoring() && ( m_nBufSize > nGrowSize ) )
{
#ifdef __VM_0819
CAr::m_pHeapMng->Free( m_lpBufStart, m_nBufSize );
#else // __VM_0819
CAr::m_pHeapMng->Free( m_lpBufStart );
#endif // __VM_0819
}
}
void CAr::Read( void* lpBuf, u_int nSize )
{
if( nSize == 0 )
return;
ASSERT( IsLoading() );
ASSERT( lpBuf );
if( m_lpBufCur + nSize <= m_lpBufMax )
{
memcpy( lpBuf, m_lpBufCur, nSize );
m_lpBufCur += nSize;
}
else // overflow
{
memset( lpBuf, 0, nSize );
m_lpBufCur = m_lpBufMax;
}
}
void CAr::Write( const void* lpBuf, u_int nSize )
{
if( nSize == 0 )
return;
ASSERT( IsStoring() );
ASSERT( lpBuf );
CheckBuf( nSize );
memcpy( m_lpBufCur, lpBuf, nSize );
m_lpBufCur += nSize;
}
// special functions for text file input and output
void CAr::WriteString( LPCTSTR lpsz )
{
int nLen = _tcslen( lpsz );
*this << nLen;
Write( lpsz, sizeof(TCHAR) * nLen );
}
LPTSTR CAr::ReadString( LPTSTR lpsz )
{
int nLen;
*this >> nLen;
Read( lpsz, sizeof(TCHAR) * nLen );
for( int i=0;i<nLen;i++ )
#ifdef __CLIENT
if( lpsz[i] == '\x60' )
lpsz[i] = '\x27';
#else // __CLIENT
if( lpsz[i] == '\x27' )
lpsz[i] = '\x60';
#endif // __CLIENT
lpsz[nLen] = '\0';
return lpsz;
}
LPTSTR CAr::ReadString( LPTSTR lpsz, int nBufSize )
{
int nLen;
*this >> nLen;
int nReadable = nBufSize - 1;
if( nLen > nReadable || nLen < 0 )
{
memset( (void*)lpsz, 0, nBufSize );
m_lpBufCur = m_lpBufMax;
return lpsz;
}
else
{
Read( lpsz, sizeof(TCHAR) * nLen );
for( int i=0;i<nLen;i++ )
#ifdef __CLIENT
if( lpsz[i] == '\x60' )
lpsz[i] = '\x27';
#else // __CLIENT
if( lpsz[i] == '\x27' )
lpsz[i] = '\x60';
#endif // __CLIENT
lpsz[nLen] = '\0';
return lpsz;
}
}
void CAr::Reserve( u_int nSize )
{
ASSERT( IsStoring() );
ASSERT( m_lpBufCur == m_lpBufStart );
if( nSize <= nGrowSize )
return;
// LPBYTE lpBuf = (LPBYTE) heapAlloc( nSize );
LPBYTE lpBuf = (LPBYTE)CAr::m_pHeapMng->Malloc( nSize );
m_lpBufStart = lpBuf;
ASSERT( m_lpBufStart );
m_nBufSize = nSize;
m_lpBufCur = m_lpBufStart;
m_lpBufMax = m_lpBufStart + m_nBufSize;
}
void CAr::CheckBuf( u_int nSize )
{
if( m_lpBufCur + nSize > m_lpBufMax )
{
u_int uOffset = m_lpBufCur - m_lpBufStart;
// u_int nExtension = nGrowSize * ( nSize / nGrowSize + 1 );
u_int nExtension = m_nBufSize * 2;
if( m_nBufSize > nGrowSize )
{
#ifdef __VM_0819
m_lpBufStart = (LPBYTE)CAr::m_pHeapMng->Realloc( m_lpBufStart, m_nBufSize + nExtension, m_nBufSize );
#else // __VM_0819
m_lpBufStart = (LPBYTE)CAr::m_pHeapMng->Realloc( m_lpBufStart, m_nBufSize + nExtension );
#endif // __VM_0819
// // BEGINTEST
// Error( "m_nBufSize : %d, Realloc Size : %d", m_nBufSize, m_nBufSize + nExtension );
}
else
{
LPBYTE lpBuf = (LPBYTE)CAr::m_pHeapMng->Malloc( m_nBufSize + nExtension );
memcpy( lpBuf, m_lpBufStart, m_nBufSize );
m_lpBufStart = lpBuf;
}
ASSERT( m_lpBufStart );
m_nBufSize += nExtension;
m_lpBufCur = m_lpBufStart + uOffset;
m_lpBufMax = m_lpBufStart + m_nBufSize;
}
}
LPBYTE CAr::GetBuffer( int* pnBufSize )
{
ASSERT( IsStoring() );
ASSERT( pnBufSize );
*pnBufSize = m_lpBufCur - m_lpBufStart;
return m_lpBufStart;
}
void CAr::Flush( void )
{
ASSERT( IsStoring() );
m_lpBufCur = m_lpBufStart;
}
void CAr::ReelIn( u_int uOffset )
{
ASSERT( IsStoring() );
ASSERT( m_lpBufStart + uOffset <= m_lpBufCur );
#if 1
if( m_nBufSize > nGrowSize )
{
#ifdef __VM_0819
CAr::m_pHeapMng->Free( m_lpBufStart, m_nBufSize );
#else // __VM_0819
CAr::m_pHeapMng->Free( m_lpBufStart );
#endif // __VM_0819
m_lpBufStart = m_lpBuf;
m_nBufSize = nGrowSize;
m_lpBufMax = m_lpBufStart + m_nBufSize;
}
#endif // 1
m_lpBufCur = m_lpBufStart + uOffset;
}
|
|
|
07/19/2015, 22:23
|
#6
|
elite*gold: 0
Join Date: Dec 2008
Posts: 306
Received Thanks: 59
|
i will try it sir
|
|
|
 |
Similar Threads
|
Bypass - anti injection client
10/07/2016 - Metin2 Private Server - 8 Replies
Does anyone know how to bypass a metin2 client that have anti injection?
On this client does not work ".mix" hacks or "logininfo", when i put the hack in metin2 folder, the client doesn't start.
(Sry for my bad english)
|
Anyone can help to make client injection work in vsro?
11/12/2013 - SRO Coding Corner - 3 Replies
Im working on a little project where i want to use this method:
http://www.elitepvpers.com/forum/sro-coding-corne r/269936-guide-client-based-packet-injection-silkr oad.html
But i keep failing updating the addy's in it can anyone help me with this?
|
Bypass - anti injection client
07/19/2013 - Metin2 Private Server - 0 Replies
Does anyone know how to bypass a metin2 client that have anti injection?
On this client does not work ".mix" hacks or "logininfo", when i put the hack in metin2 folder, the client doesn't start.
(Sry for my bad english)
|
Multi client injection
11/05/2011 - Metin2 - 2 Replies
And here we go!
How can i inject 2 client's ?
I have several's injectors/launchers, but it's only inject the first client.
|
client injection
11/24/2010 - Eve Online - 13 Replies
YouTube - New eve client injection 4.7.2010
pls comment ;)
|
All times are GMT +1. The time now is 16:52.
|
|