Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Silkroad Online > SRO Private Server > SRO PServer Questions & Answers
You last visited: Today at 16:16

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



My server is hacked: 0x0007 0x0003 Disconnecting players

Discussion on My server is hacked: 0x0007 0x0003 Disconnecting players within the SRO PServer Questions & Answers forum part of the SRO Private Server category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Apr 2020
Posts: 41
Received Thanks: 0
My server is hacked: 0x0007 0x0003 Disconnecting players

My server is hacked, I get the message at SR_ShardManager:
msg is not completely used : IP:***.***.***.*** Req:0x0007 (0x0000) (MsgType:7), 32 - 31
msg is not completely used : IP:***.***.***.*** Req:0x0003 (0x0000) (MsgType:7), 32 - 31

Disconnecting players when logging in, could it be a new IWA exploit. Please help me fix it
zalo0944172680 is offline  
Old 11/02/2020, 17:01   #2
 
#HB's Avatar
 
elite*gold: 100
Join Date: Sep 2017
Posts: 1,108
Received Thanks: 903
These messages are normal.

New IWA exploit? xd
#HB is offline  
Old 11/02/2020, 17:10   #3
dotCom
 
Devsome's Avatar
 
elite*gold: 9842
The Black Market: 107/0/0
Join Date: Mar 2009
Posts: 16,834
Received Thanks: 4,667
Quote:
Originally Posted by #HB View Post
These messages are normal.

New IWA exploit? xd
who ever called it iwa exploit: maybe one of these
Devsome is offline  
Old 11/02/2020, 17:13   #4
 
elite*gold: 0
Join Date: Apr 2020
Posts: 41
Received Thanks: 0
Quote:
Originally Posted by Devsome View Post
who ever called it iwa exploit: maybe one of these
Please help me fix it, I used a lot of code related 0x7007 but still got exploit
zalo0944172680 is offline  
Old 11/02/2020, 17:14   #5
dotCom
 
Devsome's Avatar
 
elite*gold: 9842
The Black Market: 107/0/0
Join Date: Mar 2009
Posts: 16,834
Received Thanks: 4,667
Quote:
Originally Posted by zalo0944172680 View Post
Please help me fix it, I used a lot of code related 0x7007 but still got exploit
Whatever filter you are using, just block it or use a whitelist.
Devsome is offline  
Old 11/02/2020, 17:19   #6
 
elite*gold: 0
Join Date: Apr 2020
Posts: 41
Received Thanks: 0
Quote:
Originally Posted by Devsome View Post
Whatever filter you are using, just block it or use a whitelist.
#region 0x7007_CLIENT_CHARSCREEN
else if (_pck.Opcode == 0x7007)
{
if (!this.isCharScreen)
{
Send(false);
continue;
}
byte response = _pck.ReadUInt8();
switch (response)
{
#region Create char
case 1:
{
try
{
_pck.ReadAscii(); // Charname

_pck.ReadUInt32(); // RefObjID

_pck.ReadUInt8(); // Height

_pck.ReadUInt32(); // ItemID
_pck.ReadUInt32(); // ItemID
_pck.ReadUInt32(); // ItemID
_pck.ReadUInt32(); // ItemID
}
catch
{
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Char screen call
case 2:
{
if (_pck.GetBytes().Length > 1)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Delete char by name
case 3:
{
int name_length = _pck.ReadAscii().Length;
if ((_pck.GetBytes().Length - name_length) != 3)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Restore char by name
case 4:
{
int name_length = _pck.ReadAscii().Length;
if ((_pck.GetBytes().Length - name_length) != 3)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Don't remember what this is, but it exists
case 5:
{
int name_length = _pck.ReadAscii().Length;
if ((_pck.GetBytes().Length - name_length) != 3)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Default
default:
{
this.DisconnectModuleSocket();
return;
}
#endregion

}

m_RemoteSecurity.Send(_pck);
Send(true);
continue;
}
#endregion


I used this code but still attacked the server, please help me fix it
zalo0944172680 is offline  
Old 11/02/2020, 17:37   #7
 
#HB's Avatar
 
elite*gold: 100
Join Date: Sep 2017
Posts: 1,108
Received Thanks: 903
Quote:
Originally Posted by Devsome View Post
who ever called it iwa exploit: maybe one of these
I know about that, but that was an old exploit and is fixed in most servers rn, but I'm laughing at the fact that he's calling any new exploit as IWA's, just because IWA released an exploit before.
#HB is offline  
Old 11/02/2020, 17:51   #8
 
elite*gold: 0
Join Date: Apr 2012
Posts: 263
Received Thanks: 271
Quote:
Originally Posted by zalo0944172680 View Post
#region 0x7007_CLIENT_CHARSCREEN
else if (_pck.Opcode == 0x7007)
{
if (!this.isCharScreen)
{
Send(false);
continue;
}
byte response = _pck.ReadUInt8();
switch (response)
{
#region Create char
case 1:
{
try
{
_pck.ReadAscii(); // Charname

_pck.ReadUInt32(); // RefObjID

_pck.ReadUInt8(); // Height

_pck.ReadUInt32(); // ItemID
_pck.ReadUInt32(); // ItemID
_pck.ReadUInt32(); // ItemID
_pck.ReadUInt32(); // ItemID
}
catch
{
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Char screen call
case 2:
{
if (_pck.GetBytes().Length > 1)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Delete char by name
case 3:
{
int name_length = _pck.ReadAscii().Length;
if ((_pck.GetBytes().Length - name_length) != 3)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Restore char by name
case 4:
{
int name_length = _pck.ReadAscii().Length;
if ((_pck.GetBytes().Length - name_length) != 3)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Don't remember what this is, but it exists
case 5:
{
int name_length = _pck.ReadAscii().Length;
if ((_pck.GetBytes().Length - name_length) != 3)
{
MainForm.SUSPECT++;
this.DisconnectModuleSocket();
return;
}
}
break;
#endregion

#region Default
default:
{
this.DisconnectModuleSocket();
return;
}
#endregion

}

m_RemoteSecurity.Send(_pck);
Send(true);
continue;
}
#endregion


I used this code but still attacked the server, please help me fix it
you have video demo exploit ?
thaidu0ngpr0 is offline  
Old 11/03/2020, 22:58   #9
 
bimbum*'s Avatar
 
elite*gold: 47
Join Date: Oct 2017
Posts: 574
Received Thanks: 967
close ur server and play gamegami
bimbum* is offline  
Old 11/05/2020, 21:17   #10
 
elite*gold: 0
Join Date: Feb 2012
Posts: 25
Received Thanks: 142
Quote:
Originally Posted by #HB View Post
I know about that, but that was an old exploit and is fixed in most servers rn, but I'm laughing at the fact that he's calling any new exploit as IWA's, just because IWA released an exploit before.
These exploits has nothing to do with me, people often miscredit me for years due to my nick..
IWA is name given to specific kind of sro exploits that disconnect players. Credits goes to goofie (he usually targeted servers which owned by arabs, hence the name IWA=I Warn Arabs)
Iwa13 is offline  
Thanks
4 Users
Old 11/05/2020, 23:16   #11
 
#HB's Avatar
 
elite*gold: 100
Join Date: Sep 2017
Posts: 1,108
Received Thanks: 903
Quote:
Originally Posted by Iwa13 View Post
(he usually targeted servers which owned by arabs, hence the name IWA=I Warn Arabs)
Wow, didn't know that, makes sense now.
#HB is offline  
Reply


Similar Threads Similar Threads
Disconnecting Players HELP
06/24/2018 - Metin2 Private Server - 6 Replies
Hello community!! Can someone tell me how to solve this problem, my friends enter in my server and for long time playing they are getting disconnected. for not reason I saw syserr ch1: SYSERR: Jun 23 12:35:00 :: socket_bind: bind: Address already in use SYSERR: Jun 23 12:35:55 :: GetServerLocation: location error name mapindex 0 0 x 0 empire 2 SYSERR: Jun 23 12:36:01 :: GetServerLocation: location error name mapindex 0 0 x 0 empire 2 SYSERR: Jun 23 12:36:34 :: GetServerLocation:...
selling fifa world hacked players (99 players)
04/01/2015 - Fifa Trading - 10 Replies
Hi guys :D i am new to this forum .. so i am currently selling hacked players in fifa world. If you are interested please contact me at origin jackclaw4322 price: 5 players = 15k coins 10 players = 30k coins
Disconnecting players in Guild war?
08/16/2005 - Conquer Online 2 - 8 Replies
Ok this happened to me last week and was wondering if anyone can shed some light on this. A trojan (water > tro) after killing me inside the guild house used Adv. Cure and cured himself for 900 HP, Immediately disconnecting me and sending me to jail, and gaining the win for them. I think the Action.dat was probably what was tampered with but still dont know, and please dont flame me for not looking, Ive searched already, and dont have all the time in the world. Anyone got any idea how this...



All times are GMT +1. The time now is 16:17.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.