Register for your free account! | Forgot your password?

Go Back   elitepvpers > Shooter > WarRock > WarRock Hacks, Bots, Cheats & Exploits
You last visited: Today at 00:14

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Release] WarRock Packet Sniffer Source

Discussion on [Release] WarRock Packet Sniffer Source within the WarRock Hacks, Bots, Cheats & Exploits forum part of the WarRock category.

Reply
 
Old   #1
 
elite*gold: 1
Join Date: Jul 2008
Posts: 78
Received Thanks: 93
[Release] WarRock Packet Sniffer Source

Moin moin Ich Release hier ma mein nicht ganz fertigen WarRock Packer Sniffer.
ich habe den Sniffer Selber geschrieben mit SharpPcap. Es ist Aber auch so das Warrock irgend wie eine neue Crypto auch hat und mit dem sniffer nicht alles entschlüsselt wird von daher were es gut wenn jmd die neue crypto kennt mir die per pn zu schiken ich bevorzuge c# code.

Source:

Code:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.IO;
using SharpPcap.WinPcap;
using SharpPcap.LibPcap;
using PacketDotNet.LLDP;
using SharpPcap;

namespace WarrockPacketsniffer
{
    class Program
    {
        public static string DeviceIP = string.Empty;
        public static void Main(string[] args)
        {

            string ver = SharpPcap.Version.VersionString;
            /* Print SharpPcap version */
            Console.WriteLine("SharpPcap {0}", ver);
            Console.WriteLine();

            /* Retrieve the device list */
            var devices = CaptureDeviceList.Instance;

            /*If no device exists, print error */
            if (devices.Count < 1)
            {
                Console.WriteLine("No device found on this machine");
                return;
            }

            Console.WriteLine("The following devices are available on this machine:");
            Console.WriteLine("----------------------------------------------------");
            Console.WriteLine();

            int i = 0;

            /* Scan the list printing every entry */
            foreach (var dev in devices)
            {
                /* Description */
                Console.WriteLine("{0}) {1} {2}", i, dev.Name, dev.Description);

                i++;
            }

            Console.WriteLine();
            Console.Write("-- Please choose a device to capture: ");
            i = int.Parse(Console.ReadLine());

            var device = devices[i];

            //Register our handler function to the 'packet arrival' event
            device.OnPacketArrival +=
                new PacketArrivalEventHandler(device_OnPacketArrival);

            // Open the device for capturing
            int readTimeoutMilliseconds = 1000;
            device.Open(DeviceMode.Promiscuous, readTimeoutMilliseconds);

            //tcpdump filter to capture only TCP/IP packets
            string filter = "tcp port 5330 || tcp port 5340||udp port 5330 || udp port 5340";
            device.Filter = filter;

            //WinPcapDeviceList devices2 = WinPcapDeviceList.Instance;

            foreach (WinPcapDevice dev in devices)
            {
                Console.Out.WriteLine("{0}", dev.Description);

                foreach (PcapAddress addr in dev.Addresses)
                {
                    if (addr.Addr != null && addr.Addr.ipAddress != null)
                    {
                        DeviceIP = addr.Addr.ipAddress.ToString();
                    }
                }
            }

            Console.WriteLine();
            Console.WriteLine
                ("-- The following tcpdump filter will be applied: \"{0}\"",
                filter);
            Console.WriteLine
                ("-- Listening on {0}, hit 'Ctrl-C' to exit...",
                device.Description);
            // Start capture 'INFINTE' number of packets
            device.Capture();

            // Close the pcap device
            // (Note: this line will never be called since
            //  we're capturing infinite number of packets
            device.Close();
        }

        /// <summary>
        /// Prints the time, length, src ip, src port, dst ip and dst port
        /// for each TCP/IP packet received on the network
        /// </summary>
        private static void device_OnPacketArrival(object sender, CaptureEventArgs e)
        {
            var packet = PacketDotNet.Packet.ParsePacket(e.Packet);
            var tcpPacket = PacketDotNet.TcpPacket.GetEncapsulated(packet);
            var UDPPacket = PacketDotNet.UdpPacket.GetEncapsulated(packet);
            if (tcpPacket != null)
            {
                var ipPacket = (PacketDotNet.IpPacket)tcpPacket.ParentPacket;
                System.Net.IPAddress srcIp = ipPacket.SourceAddress;
                System.Net.IPAddress dstIp = ipPacket.DestinationAddress;
                int srcPort = tcpPacket.SourcePort;
                int dstPort = tcpPacket.DestinationPort;
                if (ipPacket.SourceAddress.ToString() == DeviceIP)
                {
                    string Packet = string.Empty;
                    string tpacket = ClientdeCrypt(packet.Bytes);
                    try
                    {
                        string[] sBlocks = tpacket.Split(new char[] { ' ' });
                        int counter = 0;
                        string tmpString = string.Empty;
                        int Time = sBlocks[0].Length;
                        foreach (var s in sBlocks[0])
                        {
                            if (counter >= Time - 10)
                            {
                                tmpString += s;
                            }
                            counter++;
                        }
                        sBlocks[0] = tmpString;
                        foreach (var s2 in sBlocks)
                        {
                            Packet += " " + s2;
                        }
                    }
                    catch (Exception ex) { Console.WriteLine(ex.ToString()); }
                    FileStream Log = new FileStream(@"log.txt", FileMode.OpenOrCreate, FileAccess.Write);
                    StreamWriter Writer = new StreamWriter(Log, System.Text.Encoding.GetEncoding(28605));
                    Writer.BaseStream.Seek(0, SeekOrigin.End);
                    Writer.WriteLine("[ClientPacket] Port: {0} IP:{1} Protokoll:tcp", srcPort, srcIp);
                    Writer.WriteLine(Packet);
                    Writer.WriteLine();
                    Writer.Close();
                    Log.Close();
                    Console.WriteLine("Log Packet From Client");
                }
                else
                {
                    string Packet = string.Empty;
                    string tpacket = ServerdeCrypt(packet.Bytes);
                    try
                    {
                        string[] sBlocks = tpacket.Split(new char[] { ' ' });
                        int counter = 0;
                        string tmpString = string.Empty;
                        int Time = sBlocks[0].Length;
                        foreach (var s in sBlocks[0])
                        {
                            if (counter >= Time - 10)
                            {
                                tmpString += s;
                            }
                            counter++;
                        }
                        sBlocks[0] = tmpString;
                        foreach (var s2 in sBlocks)
                        {
                            Packet += " " + s2;
                        }
                    }
                    catch (Exception ex) { Console.WriteLine(ex.ToString()); }
                    FileStream Log = new FileStream(@"log.txt", FileMode.OpenOrCreate, FileAccess.Write);
                    StreamWriter Writer = new StreamWriter(Log, System.Text.Encoding.GetEncoding(28605));
                    Writer.BaseStream.Seek(0, SeekOrigin.End);
                    Writer.WriteLine("[ServerPacket] Port: {0} IP:{1} Protokoll:tcp", srcPort, srcIp);
                    Writer.WriteLine(Packet);
                    Writer.WriteLine();
                    Writer.Close();
                    Log.Close();
                    Console.WriteLine("Log Packet From Server");
                }
            }
            if (UDPPacket != null)
            {
                //todo udp Handling
                var ipPacket = (PacketDotNet.IpPacket)UDPPacket.ParentPacket;
                if (ipPacket.SourceAddress.ToString() == DeviceIP)
                {
                }
                else
                {
                }
            }

        }
        private static string ClientdeCrypt(byte[] tBytes)
        {
            for (int i = 0; i < tBytes.Length; i++)
            {
                tBytes[i] = Convert.ToByte(tBytes[i] ^ 0xC3);
            }

            return Encoding.Default.GetString(tBytes);
        }
        private static string ServerdeCrypt(byte[] tBytes)
        {
            for (int i = 0; i < tBytes.Length; i++)
            {
                tBytes[i] = Convert.ToByte(tBytes[i] ^ 0x96);
            }

            return Encoding.Default.GetString(tBytes);
        }
    }
}
benutze version der Dll
Code:
PacketDotNet.dll = version 0.8.0.0
SharpPcap.dll = version 3.5.0.0
Im anhang Finded ihr die source als project datei.

Viruscan Anhang:


Viel spass damit

Mfg Mathias1000
Attached Files
File Type: zip WarrockPacketsniffer.zip (619.6 KB, 486 views)
Mathias1000 is offline  
Thanks
2 Users
Old 12/21/2014, 23:33   #2
 
elite*gold: 0
Join Date: Sep 2013
Posts: 55
Received Thanks: 7
was bringt das
ramazan3007 is offline  
Thanks
1 User
Old 12/28/2014, 22:47   #3
 
Waller66's Avatar
 
elite*gold: 0
Join Date: Nov 2010
Posts: 1,548
Received Thanks: 333
nice work.
Waller66 is offline  
Reply


Similar Threads Similar Threads
PW Packet Sniffer
04/02/2025 - PW Hacks, Bots, Cheats, Exploits - 69 Replies
Hi there... ..long time i dont post here.. so its time for some update =] I made a very simple plugin for Cheat Engine 5.5... as the Thread says.. it is for "Sniffing" the PW packets.. BUT.. it uses the real-time Decryption/Decompression.. so, its going to show you the real deal... I can NOT garantee that is 100% accurate with the real packets but im sure about 99% of the encryption/compression proccess...
[Release] Proxy Phoenix Packet Sniffer
07/27/2013 - CO2 Programming - 32 Replies
EDIT: Seriously... ON submit I noticed that this was the wrong section and went ... "NOOOOOOO!!!" >< #request move. Hey everyone. I don't care what you do with this, just don't claim it as your own work or release it on another forum without my permission. Here's the download link: MEGAUPLOAD - The leading online storage and file delivery service #edit: http://www.elitepvpers.com/forum/co2-programming/1 393183-release-proxy-phoenix-packet-sniffer-3.html #post15388173
[Release] Dekaron Packet Sniffer
05/08/2013 - Dekaron Private Server - 25 Replies
Here you go guys: DekaronSniffer.rar http://i51.tinypic.com/2zric5d.png To use, extract both files, and put them both inside the client's bin folder. Run Sniffer.exe (Note: Sniffer.exe is a modified version of m_dekaron.exe which allows you to create character names with symbols)
CO packet sniffer
10/18/2007 - CO2 Exploits, Hacks & Tools - 49 Replies
This program allows you to see and easily log decrypted packets sent to and from the CO servers. This program does not attach to conquer or look at the memory conquer resides in. It only looks at packets coming over the network. Current limitations: Only one connection: The program can only keep track of one connection. This means that if you attempt to login again, the program will desync. If enough interest is shown in this program, it can be changed to allow multiple clients. Only...



All times are GMT +1. The time now is 00:14.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.