|
You last visited: Today at 18:01
Advertisement
[Question] Packet Encryption
Discussion on [Question] Packet Encryption within the Kal Online forum part of the MMORPGs category.
02/02/2010, 20:52
|
#16
|
elite*gold: 0
Join Date: Dec 2009
Posts: 81
Received Thanks: 31
|
any update?
|
|
|
02/02/2010, 23:18
|
#17
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
Yup,
Some news:
Client is still expelling after time. So I thought I will find from where I got pwned, but I cannot connect with Olly attached. Few minutes ago, I was thinking and I made something. Basicly I was able to connect with olly, but I still need to fix something (That won't be problem - I hope -, because I already did it for send and recv). When I will manage to connect with olly, I might be able to get some info about expells. But I don't have time for reversing (I'm really newbie to reversing) it in middle of the week so I'm not sure when it will be done.
It's possible that I won't be able to fix the expells anyway, because hackshield is really complex **** (from newbie's perspective) and I'm not directly hooking HShield functions (That would be great if I 100% knew how those functions works  ).
Now I'm going to sleep....
|
|
|
02/03/2010, 21:35
|
#18
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
Some news for today:
1st - the bad new: I didn't solved expell yet (It's probably just a memory checksum sent to server - not a big deal => read the good new).
2nd - the good new: HShield officially pwned itself. Long story short: I was searching for something and I found a something else that was fkn more interesting. What does it mean? No more HackShield error messages for me. I can even use a plain Cheat Engine now without client-close messages (Like mem manipulation, problem in function of antihacking, debugger found within your system, hacking tool detected etc.)
So only thing I have to do now, is patch the memory checksum functions. Then I can use every tool and hack I want
|
|
|
02/04/2010, 07:02
|
#19
|
elite*gold: 20
Join Date: Feb 2008
Posts: 993
Received Thanks: 173
|
Quote:
Originally Posted by Thiesius
Some news for today:
1st - the bad new: I didn't solved expell yet (It's probably just a memory checksum sent to server - not a big deal => read the good new).
2nd - the good new: HShield officially pwned itself. Long story short: I was searching for something and I found a something else that was fkn more interesting. What does it mean? No more HackShield error messages for me. I can even use a plain Cheat Engine now without client-close messages (Like mem manipulation, problem in function of antihacking, debugger found within your system, hacking tool detected etc.)
So only thing I have to do now, is patch the memory checksum functions. Then I can use every tool and hack I want
|
well done bad boy xD
|
|
|
02/04/2010, 21:18
|
#20
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
I guess it will be more complicated after update. If I bypassed driver loading and engine check, but EhSvc will end up in some ****** loop - Memory manipulation and such **** will stop working. And I got expell at login attempt. Seems there is something that checks HackShield initialization. After ping packet there is sent another packet, from hackshield( because it isn't listed in packets sent from engine pre-encryption send) - then I'm expelled.
***, I hate this game so much  .
Now I'm kinda lost. I haven't been analyzing HShield initialization to the depth, but from first look, I don't see anything which could help me understand how to bypass this s***.
I guess it's time for somebody more experienced to do it.
|
|
|
02/04/2010, 22:10
|
#21
|
elite*gold: 0
Join Date: Dec 2009
Posts: 81
Received Thanks: 31
|
I already thought they updated HSield. Can't even start Kal in Win7 without running as Admin
|
|
|
02/04/2010, 22:37
|
#22
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
I will keep trying to bypass it tomorrow. For today I have had enough. I cannot continue working on old packethack, till I won't be able to bypass driver check. But as I said, maybe somebody more experienced could help. What about Bloodx ?
|
|
|
02/04/2010, 23:12
|
#23
|
elite*gold: 55
Join Date: Mar 2006
Posts: 4,582
Received Thanks: 1,539
|
hmm, why u trying to bypass full hackshield o.O When u want hook u need only to change 1(2?) things.
Or write Emulator for Hackshield :P
|
|
|
02/04/2010, 23:42
|
#24
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
Yea when you want to hook, you need only 2 things (With my recent found it should need only one thing). But server ask for CRC after some time (You're expelled) and I want to patch it. And I have to patch it from game. So I need to connect with debugger. That means disabling the driver  .
Emulating HackShield would mean emulating AES - I have no experience with integrity checks and encryption. That would be easier to use Send and Recv from Winsock to sniff.
|
|
|
02/05/2010, 16:57
|
#25
|
elite*gold: 46
Join Date: Mar 2006
Posts: 2,589
Received Thanks: 1,198
|
@bloodx,
stop writing the same **** all the time..
@Thiesius,
really nice work youre one of the people that got my full respect. Do not use Intercepts rather detour the functions, you can detour the recv very easly its not crypted anyway on send you gotta encrypt the packets and code an unhook when HackShield checks for your send function . With Unhook I mean when you get the Packet 0x05 -> Unhook() wait for end of the check and Hook() again. If youre already able to use Ollydbg (some people cant :P) then just follow the Packet 0x05 and you will see the function thats checkin and you will also see some variables of HackShield that change when you have CheatEngine open for example. I found out that I can modify just a Var of HackShield to make my state undetected
Ok good luck on your project .. youre on of the people that use their own brain and do not write **** all the time ..
btw I never saw you in this Section but Welcome.
|
|
|
02/05/2010, 18:09
|
#26
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
Quote:
Originally Posted by syntex
@bloodx,
stop writing the same shit all the time..
@Thiesius,
really nice work youre one of the people that got my full respect. Do not use Intercepts rather detour the functions, you can detour the recv very easly its not crypted anyway on send you gotta encrypt the packets and code an unhook when HackShield checks for your send function . With Unhook I mean when you get the Packet 0x05 -> Unhook() wait for end of the check and Hook() again. If youre already able to use Ollydbg (some people cant :P) then just follow the Packet 0x05 and you will see the function thats checkin and you will also see some variables of HackShield that change when you have CheatEngine open for example. I found out that I can modify just a Var of HackShield to make my state undetected
Ok good luck on your project .. youre on of the people that use their own brain and do not write shit all the time ..
btw I never saw you in this Section but Welcome.
|
Thank you, that kinda cheered me up. I was already thinking about Unhook/Hook, but I thought that it is kinda nooby do it this way  and you will loose some sniffed data. And yes I noticed that there is sent another packet after 0x05 (ping packet I guess), but it doesn't went throught engine's send. Just before the update I found a HShield callback... I modified it and was laughing when I saw those messages "Change in memory sector at: XXXXXX" or "Undefined hacking tool detected" and HShield was unable to do anything. I saved the pattern, but seems that it was changed after update.
So you are saying that there is variable that stores HackShield initialization status (driver not loaded)? But if I don't let driver initialize, other hackshield function will stop working (like integrity check). Thank you again.
|
|
|
02/07/2010, 17:56
|
#27
|
elite*gold: 46
Join Date: Mar 2006
Posts: 2,589
Received Thanks: 1,198
|
just a hint:
check the recv 0x03 packet (its hackshield check).
Unloading drivers isnt the simplest thing in the world :P rather try to find the functions that check for manipulated functions cause its much easier and waste less time
btw I unhook and hook on 0x03 is a good start but will end in loosing some packet informations.
Keep reversing and try to understand whats going wrong with your hack , you can simply start a new project and figure out what hook or mem edit will expell ya .. for example if you only use recv detour/hook you wont get expelled , when you add send now you will , that means send hook/detour is checked by hackshield..
good luck and keep the community on running there are may some people that can help you with your problems and bring you forward.
syntex : - )
|
|
|
02/07/2010, 20:05
|
#28
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
Quote:
Originally Posted by syntex
just a hint:
check the recv 0x03 packet (its hackshield check).
Unloading drivers isnt the simplest thing in the world :P rather try to find the functions that check for manipulated functions cause its much easier and waste less time
btw I unhook and hook on 0x03 is a good start but will end in loosing some packet informations.
Keep reversing and try to understand whats going wrong with your hack , you can simply start a new project and figure out what hook or mem edit will expell ya .. for example if you only use recv detour/hook you wont get expelled , when you add send now you will , that means send hook/detour is checked by hackshield..
syntex : - )
|
0x03 is "m" packet as far I remember. Yea I know it's a hackshield's check. I could try use hook/unhook on 0x03, but now I would like to finish my previous project. As you see I'm trying to learn as much as I can, so I can't just give up the way I chosen.
I found callback function again btw  .
Everything was kinda good before update. But how I'm supposed to reverse now? When EagleNT is loaded -> I can't attach usermode debugger to kernelmode process. And unloading EagleNT forcefully will endup in BSOD. Bypassing EagleNT loading (as I did before) -> all hackshield functions will stop operate so I can't connect or trace mem-manipulation detecting functions (but the hackshield won't close the game aswell  ).
Today I had one goal -> Let's figure out those session Keys. I did it.... Was kinda suprised how easy it was. Now I can simply "run and play"
Now I don't know: Shall I release it or not? I think I know what would Inix do after the release, but maybe I would be able to reverse it again...
Quote:
|
good luck and keep the community on running there are may some people that can help you with your problems and bring you forward.
|
Well, maybe you
|
|
|
02/07/2010, 23:18
|
#29
|
elite*gold: 20
Join Date: Jul 2007
Posts: 1,979
Received Thanks: 270
|
Thiesius. I really like what you're doing here and i read every post. If I were you, i wouldn't release this.
You're giving enough information here and if you release it Inix will destroy it and destroy you're work, but as it is here, inix won't be able to do anything; i hope 
Really nice work, but i don't even know how to decrypt 'm' packets  never spent time to find out =]
|
|
|
02/07/2010, 23:41
|
#30
|
elite*gold: 0
Join Date: Feb 2009
Posts: 256
Received Thanks: 474
|
To be honest, I don't know much about 'm' packets either. I just recognize, that most of them belongs to anti-hack, because I got obviously kicked many times on those packets. I guess it contains CRCs or hacking tool warnings anyway - so I should focus on recv. It might work like that: RECV: type:MAKECRC data:FUNCTION54,FUNCTION12,FUNCTION41. Request is processed and then in some "m" packet, the info is sent. And server checks: If any of CRC != REALCRC then "I'm gonna expell ya buddy". I don't know a lot of things yet, things above are just speculations. I should focus on packet flow to understand it little bit better, but now I have to beat that fkn HShield initialization protection (maybe if I unpack it? But I'm sure the Themida would beat my *** again).
|
|
|
 |
|
Similar Threads
|
BOI Packet Encryption
09/28/2011 - Battle of the Immortals - 13 Replies
I've made some research about the packet encryption used in this game and I thought I'd share them.
BOI uses a simple XOR-Algorithm. Each byte of a packet is being XORed with the value of the previous byte. The first byte of every packet indicates its length. Furthermore the first byte of the very first packet sent after the connection was established is being XORed with the value 0xCD.
Example:
Let's say the client sends this packet right after connecting to the server.
0x06 0xA7 0x57...
|
Packet encryption.
06/22/2009 - Shaiya - 2 Replies
Not sure if anyone has tried making a proxy yet, other than the one that is stickied (which is injected and I imagine directly hooks the games send function bypassing the need for encryption?).
Anyway, just curious if anyone knows what sort of encryption is being used on packets?
US server for the record.
|
Help with Packet Encryption?
04/16/2009 - General Coding - 9 Replies
can someone help with these packets? im completely lost lol.i typed in A,B,ABC aand recorded the 3 packets
A
2C 35 52 66 BF 66 15 E1 2C 3A D6 AD E3 29 82 A9 BC C5 EE F5 90 A9 1A 71 0C CD 06 3D FC 3A F6 5C A7 A1 4C 30 63 CD 03 AE 12 A6 20 88 1E C0 E8 95 19 F3 3D A7 42 3A 09 22
B
A7 9E F9 6D D4 5D 9E 6A F7 81 0D D6 B8 22 D9 52 57 8E E5 9E 9B 92 31 9A 97 F6 DD 46 A7 11 ED A7 6C 8A E7 7B 08 F6 48 65 09 EE C8 80 76 78 00 1D 81 8B 85 BF 79 F2 D1 BA
|
Packet Encryption
02/22/2007 - General Coding - 4 Replies
so heute mal nichts zu tun also hab ich mal nach einem opfer ausschau gehalten und stieß dabei auf steam
steam ist wie vermutlich jeder weiß eine online platform zum kaufen und spielen von spielen
einige dinge die ich mir ueberlegt hab:
steam bruter
no-recoil hack fuer cs
ein steam bruter gab es soweit ich weiß noch nicht und koennte sich als sehr nuetzlich erweisen natuerlich sollte er interface unabhaengig sein und rein auf packet basis arbeiten
keke wireshark angeschmissen...
|
Packet encryption
09/19/2005 - Lineage 2 - 1 Replies
Hi,I'm trying to make a simple L2 bot, but i got stuck in begginning - in the packet encryption. I rewrote the l2j login thread sources (those about encryption) but it doesn't work. Has anyone any description of L2 packet encryption. And second question - what Init packet (server packet,nr. 0) means? I guess that it something related with encryption, but in l2j sources that packet content is hardcoded.
Thanks for replies (if any ;) )
|
All times are GMT +1. The time now is 18:04.
|
|