exmap: Maphack, Packet Logger, etc. menu

User Tag List

Page 3 of 12 FirstFirst 1234567 ... LastLast
Results 31 to 45 of 173
  1. #31
    poebota5's Avatar Member
    Reputation
    3
    Join Date
    Dec 2017
    Posts
    53
    Thanks G/R
    14/2
    Trade Feedback
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    any one banned ? )

    exmap: Maphack, Packet Logger, etc.
  2. #32
    everknown's Avatar Active Member
    Reputation
    17
    Join Date
    Jun 2012
    Posts
    121
    Thanks G/R
    33/11
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Since patch 3.1.2, sometimes when loading different zone, it will cause game to hang until it crashes. It unhooked during long loading screen, the game will work again.

  3. Thanks fudenciolino (1 members gave Thanks to everknown for this useful post)
  4. #33
    maper's Avatar Elite User __readgsqword(0x188); CoreCoins Purchaser
    Reputation
    496
    Join Date
    Nov 2013
    Posts
    356
    Thanks G/R
    26/353
    Trade Feedback
    0 (0%)
    Mentioned
    3 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everknown View Post
    Since patch 3.1.2, sometimes when loading different zone, it will cause game to hang until it crashes. It unhooked during long loading screen, the game will work again.
    I can't reproduce this issue - anything more specific you can share? Certain zones in particular, certain packet logging modes, etc?

  5. Thanks fudenciolino (1 members gave Thanks to maper for this useful post)
  6. #34
    everknown's Avatar Active Member
    Reputation
    17
    Join Date
    Jun 2012
    Posts
    121
    Thanks G/R
    33/11
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Last night it was during map run T6-11.
    Today after i saw your message, i went to try Merciless lab with it and it worked fine so far.
    Will try to do some maps and see if i get same issue again.

    ---Edit---
    I've done quite a few maps, haven't been able to reproduce the long loading screen that leads to crash either this time.
    Last edited by everknown; 01-20-2018 at 06:07 PM.

  7. Thanks maper (1 members gave Thanks to everknown for this useful post)
  8. #35
    Sart's Avatar Member
    Reputation
    2
    Join Date
    Jan 2018
    Posts
    1
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Thank you good work

  9. Thanks fudenciolino (1 members gave Thanks to Sart for this useful post)
  10. #36
    Nexusphobiker's Avatar Member
    Reputation
    3
    Join Date
    May 2014
    Posts
    6
    Thanks G/R
    4/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    @maper did you try reversing the encryption mechanism? It seems to be Salsa20. I tested a bit a round and the key and iv seems to be set by the first login packet. I didnt get far though. They seem to be using montgomery multiplication and a lot of byte byte shuffling. Things i have so far:

    Code:
    byte[] pshufb = {07 06 05 04 03 02 01 00 0F 0E 0D 0C 0B 0A 09 08}
    byte[] staticKey = {08 C9 BC F3 67 E6 09 6A 3B A7 CA 84 85 AE 67 BB 2B F8 94 FE 72 F3 6E 3C F1 36 1D 5F 3A F5 4F A5 D1 82 E6 AD 7F 52 0E 51 1F 6C 3E 2B 8C 68 05 9B 6B BD 41 FB AB D9 83 1F 79 21 7E 13 19 CD E0 5B}
    Those are statics in the binary. pshufb seems to get used for all byte shuffles they do. The key creation starts after the first send&recv.

    Edit: seems like they are using the crypto++ library
    Last edited by Nexusphobiker; 01-21-2018 at 04:49 PM.

  11. Thanks fudenciolino (1 members gave Thanks to Nexusphobiker for this useful post)
  12. #37
    maper's Avatar Elite User __readgsqword(0x188); CoreCoins Purchaser
    Reputation
    496
    Join Date
    Nov 2013
    Posts
    356
    Thanks G/R
    26/353
    Trade Feedback
    0 (0%)
    Mentioned
    3 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Nexusphobiker View Post
    @maper did you try reversing the encryption mechanism? It seems to be Salsa20. I tested a bit a round and the key and iv seems to be set by the first login packet. I didnt get far though. They seem to be using montgomery multiplication and a lot of byte byte shuffling. Things i have so far:

    Code:
    byte[] pshufb = {07 06 05 04 03 02 01 00 0F 0E 0D 0C 0B 0A 09 08}
    byte[] staticKey = {08 C9 BC F3 67 E6 09 6A 3B A7 CA 84 85 AE 67 BB 2B F8 94 FE 72 F3 6E 3C F1 36 1D 5F 3A F5 4F A5 D1 82 E6 AD 7F 52 0E 51 1F 6C 3E 2B 8C 68 05 9B 6B BD 41 FB AB D9 83 1F 79 21 7E 13 19 CD E0 5B}
    Those are statics in the binary. pshufb seems to get used for all byte shuffles they do. The key creation starts after the first send&recv.

    Edit: seems like they are using the crypto++ library
    Nah I haven't bothered to reverse the encryption. Not much motivation since I can hook before and after. Good work, though, looking into it!

  13. Thanks fudenciolino (1 members gave Thanks to maper for this useful post)
  14. #38
    m4ttrick's Avatar Member
    Reputation
    4
    Join Date
    Jan 2018
    Posts
    1
    Thanks G/R
    0/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Actually, there is Salsa20 encryption - at least according to previous protocol reverse engineering attempt. But, as far as I understood, first login packet is encrypted by randomly generated private key, stored in game client memory, and then probably public key is sent to server, so every following packet can be encrypted.

    If you analyse first login packet, you have the same 4 bytes at the beginning (\x00\x02\x00\x80) and 2 zeros on the end. With first packet length = 134, the rest is 128 bytes - so this probably confirms, that it is public key of some sort (RSA?).

    If you want to know something more, please look at Blizzhackers • View topic - Path of Exile Protocol. But it is from 1.0 version I think, so there might be a complete overhaul of protocol. But OPN files are definetely worth looking at (GitHub - Zoxc/PoE-OPN: OPN files for the Path of Exile network protocol).

    I'm also trying to figure out and reverse engineer protocol, but my goal is strictly different. I want to make something similar to famous Diablo II RedVex, that is man-in-the-middle proxy for PoE with plugins support. Will keep you informed if I find something interesting.

  15. Thanks Nexusphobiker, GameHelper (2 members gave Thanks to m4ttrick for this useful post)
  16. #39
    Nexusphobiker's Avatar Member
    Reputation
    3
    Join Date
    May 2014
    Posts
    6
    Thanks G/R
    4/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by m4ttrick View Post
    Actually, there is Salsa20 encryption - at least according to previous protocol reverse engineering attempt. But, as far as I understood, first login packet is encrypted by randomly generated private key, stored in game client memory, and then probably public key is sent to server, so every following packet can be encrypted.

    If you analyse first login packet, you have the same 4 bytes at the beginning (\x00\x02\x00\x80) and 2 zeros on the end. With first packet length = 134, the rest is 128 bytes - so this probably confirms, that it is public key of some sort (RSA?).

    If you want to know something more, please look at Blizzhackers • View topic - Path of Exile Protocol. But it is from 1.0 version I think, so there might be a complete overhaul of protocol. But OPN files are definetely worth looking at (GitHub - Zoxc/PoE-OPN: OPN files for the Path of Exile network protocol).

    I'm also trying to figure out and reverse engineer protocol, but my goal is strictly different. I want to make something similar to famous Diablo II RedVex, that is man-in-the-middle proxy for PoE with plugins support. Will keep you informed if I find something interesting.
    That is actually beautiful. I didnt had too much time looking into it this week but this makes me want to look at it again. Thanks

  17. Thanks fudenciolino (1 members gave Thanks to Nexusphobiker for this useful post)
  18. #40
    ttony113's Avatar Member
    Reputation
    2
    Join Date
    Oct 2017
    Posts
    1
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Interesting. I've been digging into the binary and i can confirm. As last of yesterday its still sending the initial \x00\x02\x00\x80, this packet is encrypted differently than the following data. I'm also trying to replicate the client, been trying to decompile how it decrypts the packet, it doesnt seem impossible just to replicate the logic. That said, this is probably the hardest approach i guess, but its the only one i know of right now.
    Can confirm theyre using Crypto++.

  19. Thanks Nexusphobiker (1 members gave Thanks to ttony113 for this useful post)
  20. #41
    links1's Avatar Member
    Reputation
    1
    Join Date
    Jul 2017
    Posts
    20
    Thanks G/R
    12/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    64-bit client only.


    damn feels haha

  21. #42
    fudenciolino's Avatar Member
    Reputation
    1
    Join Date
    Feb 2018
    Posts
    43
    Thanks G/R
    38/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Would it be possible for the map to be revealed outside of PoE? Wouldn't it be safer to have it revealed in another window? Not messing with the game files at all.

  22. #43
    maper's Avatar Elite User __readgsqword(0x188); CoreCoins Purchaser
    Reputation
    496
    Join Date
    Nov 2013
    Posts
    356
    Thanks G/R
    26/353
    Trade Feedback
    0 (0%)
    Mentioned
    3 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by fudenciolino View Post
    Would it be possible for the map to be revealed outside of PoE? Wouldn't it be safer to have it revealed in another window? Not messing with the game files at all.
    It is possible. Whether or not it would be safer depends entirely on the implementation.

    Not sure it would be worth the effort, though.

  23. #44
    kutomi1234's Avatar Member
    Reputation
    1
    Join Date
    Feb 2018
    Posts
    4
    Thanks G/R
    5/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Today was an update, this cheat still undetected?

  24. #45
    DiMATRON's Avatar Member
    Reputation
    3
    Join Date
    Feb 2009
    Posts
    5
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    possible to show monsters on map ?

Page 3 of 12 FirstFirst 1234567 ... LastLast

Similar Threads

  1. [HACK] Undetected Warcraft 3 yHack (maphack, zoom hack etc..)
    By greenegzofyoshi in forum RTS Game Discussions
    Replies: 12
    Last Post: 3 Days Ago, 09:03 AM
  2. SwTor Server Packet logger 1.4 beta
    By the1domo in forum SWTOR Emulator Servers
    Replies: 16
    Last Post: 03-28-2012, 07:02 PM
  3. WoWProxy[UD Packet Logger]
    By [Shon3m] in forum World of Warcraft Bots and Programs
    Replies: 19
    Last Post: 05-06-2009, 08:50 PM
  4. WoWProxy[UD Packet Logger]
    By [Shon3m] in forum WoW EMU Programs
    Replies: 1
    Last Post: 04-30-2009, 04:20 PM
  5. fake programs loggers etc notice
    By dmc22 in forum Suggestions
    Replies: 0
    Last Post: 08-24-2008, 06:53 PM
All times are GMT -5. The time now is 03:50 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search