Crypto ; packet decrypt stuff menu

User Tag List

Page 3 of 4 FirstFirst 1234 LastLast
Results 31 to 45 of 54
  1. #31
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    I wish, i could have helped more, but with win 8.1 it's not possible for me to debug the compressed/encrypted exe or i'm to stupid. At olly dumping there is a can't read memory exception, without dumping eso's error form comes up, the same probs under ida. A look at the uncompressed exe with ida is fine, but not the same as debugging at runtime and look what values are written into the registers. I turned aslr off through a prg called emet(from ms). The only thing i can do, is to port the python part into C# ;-)

    Crypto ; packet decrypt stuff
  2. #32
    races's Avatar Corporal
    Reputation
    1
    Join Date
    Jan 2014
    Posts
    22
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    You just have to use the binary shared from blar0, and load it into IDA, and for having the same RVA (with static analysis and dynamic), just change the DLLCharacteristics of the original eso binary, for removing ASLR on the binary.

  3. #33
    blar0's Avatar Active Member
    Reputation
    17
    Join Date
    Apr 2012
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by races View Post
    You just found how to switch on your brain ! GG
    haha

    Originally Posted by races View Post
    Just received a MP from member dodoman :



    did this guy contact you blar0 ?
    The guy doesn't describe the crash ...
    The second question has no sense, the guy doesn't understand that he have to code a server and not a client.
    LOL

    Originally Posted by Esoserv2 View Post
    I wish, i could have helped more, but with win 8.1 it's not possible for me to debug the compressed/encrypted exe or i'm to stupid. At olly dumping there is a can't read memory exception, without dumping eso's error form comes up, the same probs under ida. A look at the uncompressed exe with ida is fine, but not the same as debugging at runtime and look what values are written into the registers. I turned aslr off through a prg called emet(from ms). The only thing i can do, is to port the python part into C# ;-)
    Enjoy => Private Paste - Pastie (LAST VERSION OF MY STUFF)

    Originally Posted by races View Post
    You just have to use the binary shared from blar0, and load it into IDA, and for having the same RVA (with static analysis and dynamic), just change the DLLCharacteristics of the original eso binary, for removing ASLR on the binary.
    Exactly works fine on every OS, I mostly work with windbg under windows 8.1, it works fine.

  4. #34
    dodoman's Avatar Private
    Reputation
    1
    Join Date
    Jan 2014
    Posts
    6
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Sorry if iäm to nooby for you guys, i'm still learning how all this stuff works.
    afaic i can learn alot here ^^

  5. #35
    blar0's Avatar Active Member
    Reputation
    17
    Join Date
    Apr 2012
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    The reproach is to say it crashs, without giving any clue (like where crash occurs, last log of the code, etc ..), we can't help you without that

  6. #36
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by races View Post
    You just have to use the binary shared from blar0, and load it into IDA, and for having the same RVA (with static analysis and dynamic), just change the DLLCharacteristics of the original eso binary, for removing ASLR on the binary.
    Hey thanks, that was no problem neither, no rebasing, but that's not the problem... i can't debug, because this error is thrown: "The instruction at 0x15E7CA8 referenced memory at 0x4668B7. The memory could not be written -> 004668B7 (exc.code c0000005, tid 4212)". I can't bypass :-( Month before the exe was encrypted everything was good...

    What am I doing wrong?

  7. #37
    blar0's Avatar Active Member
    Reputation
    17
    Join Date
    Apr 2012
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    And if you pass the exception to the program, what's happen ?
    Because the compressed (original) executable generate a lot of exception that you have to pass to the original program (they should not be handled by your debugger)

  8. #38
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by blar0 View Post
    And if you pass the exception to the program, what's happen ?
    Can't pass the exception, debugger stucks at that point. F9, F8, F7 let's me stay at that address. Only way out is to point eip to the next instruction, but then after a few lines same happens over and over again. What happens at your pc, when you execute the unpacked exe (Normal way of starting a program, not debugging)?

    To track down the fault, it happens after finding EsoGameData folder, everything loads (game0000.dat, eso0xxx.dat and so on).

  9. #39
    blar0's Avatar Active Member
    Reputation
    17
    Join Date
    Apr 2012
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    The unpacked binary is only for static analysis under IDA.
    I run under the debugger the original exe, that's why in my unpacked binary I didn't fix offset of sections, to keep same RVA under IDA the same as the debugged binary.

  10. #40
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Okay, with some logic i found out, what i did wrong. The .text segment wasn't writable, so i changed that flag with LordPE and now your unpacked eso executes like a normal prg on my system. So i used your public key and overwrote the old one in the unpacked exe with a hex editor, so that no inject.exe is needed any more. Maybe this tip can help other's who don't want to compile the masm stuff. By the way, thanks a lot for your great effort and work! Works like charme your python server.

  11. #41
    yamashi12's Avatar Master Sergeant
    Reputation
    60
    Join Date
    Jan 2011
    Posts
    126
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Wait how did you get the unpacked exe running ? Did you fix the IAT ?

  12. #42
    blar0's Avatar Active Member
    Reputation
    17
    Join Date
    Apr 2012
    Posts
    81
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by yamashi12 View Post
    Wait how did you get the unpacked exe running ? Did you fix the IAT ?
    I don't understand too, the Import Table is well constructed that's not the main problem.

    Originally Posted by Esoserv2 View Post
    Okay, with some logic i found out, what i did wrong. The .text segment wasn't writable, so i changed that flag with LordPE and now your unpacked eso executes like a normal prg on my system. So i used your public key and overwrote the old one in the unpacked exe with a hex editor, so that no inject.exe is needed any more. Maybe this tip can help other's who don't want to compile the masm stuff. By the way, thanks a lot for your great effort and work! Works like charme your python server.
    "Works like charme your python server." + without region stuff

    Really weird, because in my point of view, the Relocation Data directories should be NULL (it's not the case in all my unpacked binary iirc), the .reloc section should be flagged as executable, because all the obfuscation reside here, and the section is not executable.
    Bit if you say that it works, congratz

  13. #43
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Get the unpacked exe running on your system - tutorial

    Originally Posted by yamashi12 View Post
    Wait how did you get the unpacked exe running ? Did you fix the IAT ?
    1. Dump original exe like blar0 described or use the unpacked exe which can be downloaded here.
    2. Download LordPE (i've got an version from 2002),
    3. Click "PE Editor", open the dumped exe.
    4. Click button "sections".
    5. Right click ".text" segment. Click "edit section header".
    6. Click "..." to change flags.
    7. Check "writeable". Close dialogs.
    8. Don't forget to click "save" at end of process, otherwise your change isn't applied.

    How do i get to this solution? I debugged the unpacked exe til the point where the "can't write memory" exception is thrown. There was an instruction, who want's to write to .text segment, which is normally "read only" (i think). So i changed it to be writeable, That was the solution. Now the unpacked exe runs like the normal exe, and is not encrypted anymore. That means, i overwrote the static public key with the one provided from blar0 and got to the character selection screen, can create a character and so on. The client isn't crashing. Before i did the fix, the unpacked client crashed when running with the error reporting dialog.

    Hope it works for you too. I've got win8.1 x64 as i said before. I removed aslr from exe with a command line tool, so that there is no rebasing.

    Greetings.

  14. #44
    yamashi12's Avatar Master Sergeant
    Reputation
    60
    Join Date
    Jan 2011
    Posts
    126
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    To remove rebasing you can just change the PE flag with LordPE as well, "relocation..." will remove rebasing.

    I tried doing what you said and it didn't work for me I still get a crash...

  15. #45
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by yamashi12 View Post
    To remove rebasing you can just change the PE flag with LordPE as well, "relocation..." will remove rebasing.

    I tried doing what you said and it didn't work for me I still get a crash...
    Strange...btw. i have installed english language. So why it is working on my pc? Ok yes, i haven't thought of setting the flag with LordPE. I used the unedited unpacked_eso.live.1.0.0.714440.exe. Have you tried to dump the exe by yourself and then set the .text writable?

Page 3 of 4 FirstFirst 1234 LastLast

Similar Threads

  1. ESO Packet Decrypt/Encrypt. Close, but cannot determine key
    By jarjar1 in forum Elder Scrolls Online General
    Replies: 3
    Last Post: 10-06-2013, 12:19 PM
  2. Packet capture/decrypt lib
    By SinnerG in forum WoW Memory Editing
    Replies: 7
    Last Post: 03-24-2010, 05:00 PM
  3. [C] WoW packet decryption
    By pendra in forum WoW Memory Editing
    Replies: 12
    Last Post: 03-06-2010, 12:39 AM
  4. Packet capture/decrypt lib
    By amadmonk in forum WoW Memory Editing
    Replies: 17
    Last Post: 08-14-2009, 04:37 AM
All times are GMT -5. The time now is 07:20 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search