Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Metin2 > Metin2 Private Server
You last visited: Today at 11:50

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[WARNING] How private server AELDRA stealing your .cpp files?

Discussion on [WARNING] How private server AELDRA stealing your .cpp files? within the Metin2 Private Server forum part of the Metin2 category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Dec 2016
Posts: 7
Received Thanks: 14
[WARNING] How private server AELDRA stealing your .cpp files?

Hi! in this topic im going to explain you how Aeldra stealing people files from computer (.cpp files)

CREDITS:
xp123 (big credits, he spotted this in aeldra)
Seremo (some help in analyse packets)

Aeldra using TheMida protector to prevent from analyse thats why analyse is much harder than standard not virtualized / protected files!

1. What im using to analyse?


Static Analyse: IDA Pro (plugins: Class Informer / x86emulator / Auto RE / private scripts)
Debugging: x86dbg (plugins: HyperHide / edited TitanHide / edited ScyllaHide / OllyDumpEx )

And more private tools


2. How it works?

Aeldra search for .cpp folders on your PC when function is active (they can turn it on / off server-sided)
Packet header which sends file to Server: 0x9B
Structure:


name = file name .cpp (Example: test.cpp)
data = file data (Example: #include "stdafx.h")

Now this function is turned off when we spammed this packet (using Clientless) with a lot of files and probably server crashed after we sent too much files with no disc space result

3. Analyse

RVA + Base = 3659A0 (RVA) + 00CD0000 (base dumped file) = 0x010359A0

As you can see this function sends File to Server and its not function who send guild logo


if you more interested in this function find it yourself i dont want to add 100 screenshots in thread

----------------------------------------------------

WinAPI: FindFirstFileExW FindNextFile

They are trying to find folders with names: "xbot" / "hlbot"




[#] Then it send it to Server





Download Dumped aeldra_205_dump.exe ONLY FOR static analysis purposes!!!
Password to zip: INFECTED
Download:
VT:


Conclusions:
As you can see AV dont detect all malwares specially if its virtualized by for example: TheMida / VMProtect / Enigma it need manual analyse

AV mainly works on Heurisitc / Signature detections thats why its marked as undetected atm.


DONT TRUST ANYONE! especially private servers! no one know what owners can add inside and it's doesn't matter if they are big or small ??
KoMaR1911 is offline  
Thanks
12 Users
Old 11/28/2021, 22:57   #2
 
elite*gold: 0
Join Date: Aug 2021
Posts: 3
Received Thanks: 1
Great job on finding out this ****. They were acting all tough about malicious software while they were, in fact, malicious themselves xD
uiop2001 is offline  
Thanks
1 User
Old 11/28/2021, 23:14   #3
 
elite*gold: 0
Join Date: Oct 2020
Posts: 13
Received Thanks: 9
I always say: never trust in private servers (particularly, I dont trust even in officials)

Another thing: these garbage Metin2 anticheats (basically, Nt/Zw function hookers) are another trashes with malware behavior (Metin2 AntiCheat Lib, AC by Collosus and anothers). Hackcrappy and DumboUriel are another cancers that make trojan developers jealous...

AloneDev already exposed Uriel AntiCheat in the past too because it was trying to block you from analyse the packets being sent to the server (why? Something to hide?)

Another curious point: most Metin2 anticheats (Uriel is one) doesn't even allow you to run clients inside a VM AHAHAAHAHAHAHA 100% trustable

Sadly, its not just Aeldra doing it.

Btw, Metin2 players are 99,99% retardeds, they will continue playing it even knowing their files are getting stealed.

Regards.
trashepvp is offline  
Thanks
1 User
Old 11/29/2021, 00:37   #4



 
cypher's Avatar
 
elite*gold: 600
The Black Market: 1061/0/0
Join Date: Sep 2008
Posts: 10,541
Received Thanks: 3,083
Arrow Metin2 -> Metin2 Private Se…

#moved
cypher is offline  
Old 11/29/2021, 03:06   #5
 
No14's Avatar
 
elite*gold: 76
Join Date: Sep 2010
Posts: 2,010
Received Thanks: 2,295
Wichtig und Richtig darüber aufzuklären.
Leider hat man hier lediglich die Vorstellung geschlossen. Man sollte so etwas, mit dazu legen, damit alle wissen was Sache ist.
No14 is offline  
Old 11/29/2021, 11:30   #6
 
elite*gold: 0
Join Date: Feb 2021
Posts: 188
Received Thanks: 131
Quote:
Originally Posted by KoMaR1911 View Post
Hi! in this topic im going to explain you how Aeldra stealing people files from computer (.cpp files)

CREDITS:
xp123 (big credits, he spotted this in aeldra)
Seremo (some help in analyse packets)

Aeldra using TheMida protector to prevent from analyse thats why analyse is much harder than standard not virtualized / protected files!

1. What im using to analyse?


Static Analyse: IDA Pro (plugins: Class Informer / x86emulator / Auto RE / private scripts)
Debugging: x86dbg (plugins: HyperHide / edited TitanHide / edited ScyllaHide / OllyDumpEx )

And more private tools


2. How it works?

Aeldra search for .cpp folders on your PC when function is active (they can turn it on / off server-sided)
Packet header which sends file to Server: 0x9B
Structure:


name = file name .cpp (Example: test.cpp)
data = file data (Example: #include "stdafx.h")

Now this function is turned off when we spammed this packet (using Clientless) with a lot of files and probably server crashed after we sent too much files with no disc space result

3. Analyse

RVA + Base = 3659A0 (RVA) + 00CD0000 (base dumped file) = 0x010359A0

As you can see this function sends File to Server and its not function who send guild logo


if you more interested in this function find it yourself i dont want to add 100 screenshots in thread

----------------------------------------------------

WinAPI: FindFirstFileExW FindNextFile

They are trying to find folders with names: "xbot" / "hlbot"




[#] Then it send it to Server





Download Dumped aeldra_205_dump.exe ONLY FOR static analysis purposes!!!
Password to zip: INFECTED
Download:
VT:


Conclusions:
As you can see AV dont detect all malwares specially if its virtualized by for example: TheMida / VMProtect / Enigma it need manual analyse

AV mainly works on Heurisitc / Signature detections thats why its marked as undetected atm.


DONT TRUST ANYONE! especially private servers! no one know what owners can add inside and it's doesn't matter if they are big or small ??
for the pictures
hetznicht is offline  
Thanks
2 Users
Old 11/29/2021, 14:02   #7
 
.ZoR's Avatar
 
elite*gold: 19
Join Date: Sep 2013
Posts: 430
Received Thanks: 204
.ZoR is offline  
Thanks
11 Users
Old 11/29/2021, 17:37   #8



 
cypher's Avatar
 
elite*gold: 600
The Black Market: 1061/0/0
Join Date: Sep 2008
Posts: 10,541
Received Thanks: 3,083
Quote:
Originally Posted by No14 View Post
Wichtig und Richtig darüber aufzuklären.
Leider hat man hier lediglich die Vorstellung geschlossen. Man sollte so etwas, mit dazu legen, damit alle wissen was Sache ist.
Die Vorstellung wurde auf Wunsch des Threadersteller geschlossen. Zu dem Zeitpunkt hatte ich keine Informationen über das Vorgehen. Ich habe eine Notiz im und des Threads eingefügt. Durch meinen letzten Post wurde der Thread nochmal gebumpt, um mehr Benutzer zu erreichen.
cypher is offline  
Thanks
3 Users
Old 11/29/2021, 19:50   #9
 
!Mao's Avatar
 
elite*gold: 425
Join Date: Feb 2016
Posts: 47
Received Thanks: 125
Hi, I want to mention that all unbiased forums that he posted it 2 weeks ago deleted his topic, as of clearly false claims.
Aeldra does not access any local data on your computer outside of the Aeldra-Client folder.
Any honest person that is into Reverse Engineering or Security Research will confirm this.

----------------------------


Hello,

I would like to clarify with this text that what Komar claims here is complete bullshit and only arose from anger because I did not respond to his 20.000$ blackmail. (more on this later.)
First of all everything that is written here could have been easily found out by reading the Terms of Service on our website which he accepted. The only reason for this function was to fix xbot.
Obviously there was no intent or even a possibility to harm any player or server owners. So far it has only been used on 2 PCs and that was XP (XBot Dev) and Komar who used XPs account on purpose to blackmail us.

https://i.gyazo.com/553497d591e87330c74e0cb88f6b20f2.png

If Komar really wanted to do something other than defamation and spreading lies he would have shown the call stack or network traffic where you can clearly see that only 1 specified path is affected
"C:/Users/casper/source/repos/XBot" which anyone can find out after buying xbot and a small analyze. As mentioned above, Komar also tried to blackmail us,
which underlines the fact that the only thing that takes place here is defamation.


As mentioned before, the function only became active when a known cheat creator with debugging software(x84dbg) opened our client.
There was nothing hidden or encrypted about this function because there was never an intention to harm players. If you think this is unethical then where do you draw the line?
XP sells a bot and at the same time an anti cheat (Uriel anti cheat) and Komar tries to blackmail us to get the source of his competitor HLbot or 20.000$ BTC and spreads lies only to defame me.
XP also tried to sell us his anti cheat recently when he didn't want to fix our auto ban system anymore,
but I decided against it because of bad criticism about the system and I didn't have the trust to install this program on our players' PCs since it can be dangerous, as he even hides his identity.

This is just an attempt to defame us after attempted blackmailing, don't think he's a good person.
!Mao is offline  
Thanks
11 Users
Old 11/29/2021, 23:01   #10
 
elite*gold: 0
Join Date: Dec 2016
Posts: 822
Received Thanks: 1,149
Quote:
Originally Posted by KoMaR1911 View Post
Hi! in this topic im going to explain you how Aeldra stealing people files from computer (.cpp files)

CREDITS:
xp123 (big credits, he spotted this in aeldra)
Seremo (some help in analyse packets)

Aeldra using TheMida protector to prevent from analyse thats why analyse is much harder than standard not virtualized / protected files!

1. What im using to analyse?


Static Analyse: IDA Pro (plugins: Class Informer / x86emulator / Auto RE / private scripts)
Debugging: x86dbg (plugins: HyperHide / edited TitanHide / edited ScyllaHide / OllyDumpEx )

And more private tools


2. How it works?

Aeldra search for .cpp folders on your PC when function is active (they can turn it on / off server-sided)
Packet header which sends file to Server: 0x9B
Structure:


name = file name .cpp (Example: test.cpp)
data = file data (Example: #include "stdafx.h")

Now this function is turned off when we spammed this packet (using Clientless) with a lot of files and probably server crashed after we sent too much files with no disc space result

3. Analyse

RVA + Base = 3659A0 (RVA) + 00CD0000 (base dumped file) = 0x010359A0

As you can see this function sends File to Server and its not function who send guild logo


if you more interested in this function find it yourself i dont want to add 100 screenshots in thread

----------------------------------------------------

WinAPI: FindFirstFileExW FindNextFile

They are trying to find folders with names: "xbot" / "hlbot"




[#] Then it send it to Server





Download Dumped aeldra_205_dump.exe ONLY FOR static analysis purposes!!!
Password to zip: INFECTED
Download:
VT:


Conclusions:
As you can see AV dont detect all malwares specially if its virtualized by for example: TheMida / VMProtect / Enigma it need manual analyse

AV mainly works on Heurisitc / Signature detections thats why its marked as undetected atm.


DONT TRUST ANYONE! especially private servers! no one know what owners can add inside and it's doesn't matter if they are big or small ??
Never saw human trash like you are. Congrats!
Metin2.Zephyr is offline  
Thanks
1 User
Old 11/30/2021, 00:40   #11
 
elite*gold: 0
Join Date: Dec 2016
Posts: 7
Received Thanks: 14
Quote:
Originally Posted by cream#666 View Post
Hallo, ich verstehe nicht ganz aus welchem Grund du das ganze als "Sicherheitsgefahr" darstellst. Das was hier gezeigt wird ist für 99,99999998% der Leute uninteressant, da es sie nicht betrifft.

Komar ist mit einer der Admins von hlbot.net welcher hiervon betroffen ist, daher würde ich mich, speziell als Moderator eher der Frage annehmen ob hier gezielt versucht wird die Leute in die irre zu führen und mit aller Müh und Not einen Rufschaden erzwingen zu wollen (da es speziell seine Truppe betrifft, normaler Spieler betrifft das 0,0%)
Im not admin of any website with cheats 1 year ago i had website with cheats and i exited from metin2

Quote:
Originally Posted by !Mao View Post
Hi, I want to mention that all unbiased forums that he posted it 2 weeks ago deleted his topic, as of clearly false claims.
Aeldra does not access any local data on your computer outside of the Aeldra-Client folder.
Any honest person that is into Reverse Engineering or Security Research will confirm this.

----------------------------


Hello,

I would like to clarify with this text that what Komar claims here is complete bullshit and only arose from anger because I did not respond to his 20.000$ blackmail. (more on this later.)
First of all everything that is written here could have been easily found out by reading the Terms of Service on our website which he accepted. The only reason for this function was to fix xbot.
Obviously there was no intent or even a possibility to harm any player or server owners. So far it has only been used on 2 PCs and that was XP (XBot Dev) and Komar who used XPs account on purpose to blackmail us.



If Komar really wanted to do something other than defamation and spreading lies he would have shown the call stack or network traffic where you can clearly see that only 1 specified path is affected
"C:/Users/casper/source/repos/XBot" which anyone can find out after buying xbot and a small analyze. As mentioned above, Komar also tried to blackmail us,
which underlines the fact that the only thing that takes place here is defamation.


As mentioned before, the function only became active when a known cheat creator with debugging software(x84dbg) opened our client.
There was nothing hidden or encrypted about this function because there was never an intention to harm players. If you think this is unethical then where do you draw the line?
XP sells a bot and at the same time an anti cheat (Uriel anti cheat) and Komar tries to blackmail us to get the source of his competitor HLbot or 20.000$ BTC and spreads lies only to defame me.
XP also tried to sell us his anti cheat recently when he didn't want to fix our auto ban system anymore,
but I decided against it because of bad criticism about the system and I didn't have the trust to install this program on our players' PCs since it can be dangerous, as he even hides his identity.

This is just an attempt to defame us after attempted blackmailing, don't think he's a good person.

AND TELL ME WHAT IT CHANGE? AS I SAID STEALING IS STEALING DOESNT METTER IF YOU STEALING CHEATS CODE OR PEOPLE CODE

1. THIS System is bad is not HWID based as Nergal said this system steals .cpp files from all pc who had name casper and folders with xbot / hlbot in names
2. If you account is flagged
3. IN SCREENSHOT U SEE IT NOT STEALING FILE FROM THIS FOLDER ITS FOLDER ON DESKTOP / OTHER FOLDERS TOO IN SCREENSHOT U HAVE test folder in repos its not xbot folder!!!!!

and more i dont remember but i easyly triggered this system without calling this function manually and nergal never stolen any my file from my PC because always when im running any client im using VM (with my private anti-anti-vm bypasses) + i unmount all VeraCrypt volumes with projects
KoMaR1911 is offline  
Thanks
1 User
Old 11/30/2021, 03:45   #12


 
m2bober's Avatar
 
elite*gold: 2018
Join Date: Dec 2019
Posts: 1,085
Received Thanks: 777


for the boys

m2bober is offline  
Thanks
2 Users
Old 11/30/2021, 05:29   #13
 
elite*gold: 0
Join Date: Oct 2020
Posts: 13
Received Thanks: 9
Aeldra:
Quote:
Originally Posted by !Mao View Post
Aeldra does not access any local data on your computer outside of the Aeldra-Client folder.
Also Aeldra:
Quote:
Originally Posted by !Mao View Post
The only reason for this function was to fix xbot.
Quote:
Originally Posted by !Mao View Post
As mentioned before, the function only became active when a known cheat creator with debugging software(x84dbg) opened our client.
????????????????????

Quote:
Originally Posted by !Mao View Post
Obviously there was no intent or even a possibility to harm any player or server owners. So far it has only been used on 2 PCs
First, said he lied, but after, gets in contradiction.

Who guarantees that this has not been or cannot be used with anyone else in the way that suits you?

"It's to fix cheats". Completly amateurs, needs to hack another's PCs to try to fix a cheat and simply kicked the security and privacy of all your players to the moon. Words doesnt change facts. "Believe me because... Because I'm saying believe me!"



Quote:
Originally Posted by !Mao View Post
There was nothing hidden or encrypted about this function because there was never an intention to harm players. If you think this is unethical then where do you draw the line?
Private server owner talking about ethics


Quote:
Originally Posted by !Mao View Post
XP also tried to sell us his anti cheat recently when he didn't want to fix our auto ban system anymore,
but I decided against it because of bad criticism about the system and I didn't have the trust to install this program on our players' PCs since it can be dangerous
"The unique malware inside Aeldra's client will be our own malware, I don't want Uriel stealing my files, but we always can do it with our players"


Quote:
Originally Posted by cream#666 View Post
Hallo, ich verstehe nicht ganz aus welchem Grund du das ganze als "Sicherheitsgefahr" darstellst. Das was hier gezeigt wird ist für 99,99999998% der Leute uninteressant, da es sie nicht betrifft.
It was about these guys I was talking about when I said 99,99% of the Metin2 community be full of ret...
Obvious you don't care. You're poor, your IQ is 2 and you have nothing valuable in your PC. You're the typical "common" Metin2 player. Give me your freedom too and come be my slave, you said you don't care...


Just another cancer private server, this is why the game (in general), is dead.
trashepvp is offline  
Thanks
3 Users
Old 11/30/2021, 12:30   #14
 
Splinglol's Avatar
 
elite*gold: 50
Join Date: Aug 2012
Posts: 535
Received Thanks: 284
Sadly nothing new, some similar cases:





Quote:
Originally Posted by !Mao View Post
Hi, I want to mention that all unbiased forums that he posted it 2 weeks ago deleted his topic, as of clearly false claims.
Aeldra does not access any local data on your computer outside of the Aeldra-Client folder.
Any honest person that is into Reverse Engineering or Security Research will confirm this.

----------------------------


Hello,

I would like to clarify with this text that what Komar claims here is complete bullshit and only arose from anger because I did not respond to his 20.000$ blackmail. (more on this later.)
First of all everything that is written here could have been easily found out by reading the Terms of Service on our website which he accepted. The only reason for this function was to fix xbot.
Obviously there was no intent or even a possibility to harm any player or server owners. So far it has only been used on 2 PCs and that was XP (XBot Dev) and Komar who used XPs account on purpose to blackmail us.



If Komar really wanted to do something other than defamation and spreading lies he would have shown the call stack or network traffic where you can clearly see that only 1 specified path is affected
"C:/Users/casper/source/repos/XBot" which anyone can find out after buying xbot and a small analyze. As mentioned above, Komar also tried to blackmail us,
which underlines the fact that the only thing that takes place here is defamation.


As mentioned before, the function only became active when a known cheat creator with debugging software(x84dbg) opened our client.
There was nothing hidden or encrypted about this function because there was never an intention to harm players. If you think this is unethical then where do you draw the line?
XP sells a bot and at the same time an anti cheat (Uriel anti cheat) and Komar tries to blackmail us to get the source of his competitor HLbot or 20.000$ BTC and spreads lies only to defame me.
XP also tried to sell us his anti cheat recently when he didn't want to fix our auto ban system anymore,
but I decided against it because of bad criticism about the system and I didn't have the trust to install this program on our players' PCs since it can be dangerous, as he even hides his identity.

This is just an attempt to defame us after attempted blackmailing, don't think he's a good person.
It simply doesn't matter that you've only used it against two people so far. This function behaves like malicious malware and really shouldn't be in the client. You're abusing the trust players have put in you.
Splinglol is offline  
Thanks
3 Users
Old 11/30/2021, 13:20   #15
aka. .Dean#


 
Moderate's Avatar
 
elite*gold: 0
Join Date: Oct 2020
Posts: 733
Received Thanks: 624
Weiß nicht was ich lustiger finde, das sich jemand als der Gute hinstellen will nachdem er nicht 20k€ erpressen konnte oder das sich irgendwer wundert das M2 Clients checken was auf euren PC ist. Jahrelang gab es alleine Detections für m2bob wo der Client nur ausgelesen hat ob ihr eine Verbindung zum m2bob Server aufbaut usw, hat sich nie jemand beschwert, hat niemanden gejuckt(bei Lethal War hatte ich das auch drinnen und hab das sogar öffentlich gesagt das unser Client das macht). In 2 Wochen ist das Thema hier auch wieder untergegangen und juckt weiterhin niemanden.
Moderate is offline  
Thanks
6 Users
Reply

Tags
aeldra, metin2, source, stealing


Similar Threads Similar Threads
[How-To] Link your constants.cpp to your item_attr
12/19/2016 - Metin2 PServer Guides & Strategies - 6 Replies
Link your constants.cpp to your item_attr Hello guys, today im gonna show you a simple trick that lets you use what you have in your Srcs/server/constants.cpp What are those constants? They simply are the defined skills with they're index number. You ever asked yourself how to implement on items some bonuses like RESIST CLAW or RESIST ICE or DEFENCE POINTS and stuff like that? Well in constants.cpp you will face what are the bonus you got in your source (this is not how to implement new...
[How-To] Solutions to prevent stealing of your AutoIt-Code
02/12/2015 - AutoIt - 15 Replies
So I just want to show you some Solutions how to make stealing of your AutoIt-Code harder. Lets start with something nearly everyone knows: ------------------------------------------------- -------------------------------------------------- ------- Using Obfuscators There are official and inofficial ones. The official one may destroy less scripts than the inofficial ones but it can also get deobfuscated by decompilers.
Guide: Change your MAC Address (No tools, easy. For stealing acclaim coins)
03/12/2009 - Dekaron Exploits, Hacks, Bots, Tools & Macros - 104 Replies
(To use this to steal acclaim coins, copy your referral link off the 2moons site, save it. Log out of your main account on the site. Change your MAC(see guide), then use your referral link to make a new account, and play with that account to the required level. Easier in 9dragons is what I personally find). This is intended for stealing acclaim coins. It is possible in the future that Acclaim might start checking ip addresses also, if this happens I will make a guide that shows you how to...
***** stealing your work
11/03/2008 - Guild Wars - 11 Replies
hey guys, it has come to my attention that *********.com has been stealing your work. its an american site that is a lot like this one, BUT it costs money to see their "elite" section. I joined because I cant read german that well and freetranslations.com only can help so much. when I saw their "elite" forum for Guild wars, they had a lot of the same things, the HFF bot, Drunkard bot, and some others. They dont give credit to anyone, or say that its not theirs. I posted saying that these...



All times are GMT +1. The time now is 11:50.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.