exmap: Maphack, Packet Logger, etc. menu

User Tag List

Page 12 of 12 FirstFirst ... 89101112
Results 166 to 173 of 173
  1. #166
    maper's Avatar Elite User __readgsqword(0x188); CoreCoins Purchaser
    Reputation
    496
    Join Date
    Nov 2013
    Posts
    356
    Thanks G/R
    26/353
    Trade Feedback
    0 (0%)
    Mentioned
    3 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by naut333 View Post
    If your main purpose of this was to analyze packets could you not just run wireshark in a sandbox?
    I am no expert, from what I've read of your work you are miles ahead of me.. but to me it appears you are making it harder then it needs to be for what you are trying to accomplish.
    Accompanied with a simple automation script to capture certain lines of code at times of your choice for analysis and you should be good to go.. ie start record capture, do your ingame event you want to watch, end capture, rinse and repeat that process whatever number of times and then do a comparison of the captures to see what packets repeat themselves.
    I say to write a script for this as it will decrease the time it takes to start and stop the process which will largely decrease the amount of code you need to decipher.
    I used to do something similar to this with cheatengine for locking ammo, health etc, different process here but same idea still applies.
    This program captured the network traffic before it was encrypted and sent to the server, and after the response was decrypted from the server. Something like Wireshark would only capture the encrypted packets. Also, I did have a toggle that allowed you to turn packet capture on or off.

    exmap: Maphack, Packet Logger, etc.
  2. #167
    naut333's Avatar Active Member Developer CoreCoins Purchaser
    Reputation
    53
    Join Date
    Dec 2013
    Posts
    136
    Thanks G/R
    0/49
    Trade Feedback
    2 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by maper View Post
    This program captured the network traffic before it was encrypted and sent to the server, and after the response was decrypted from the server. Something like Wireshark would only capture the encrypted packets. Also, I did have a toggle that allowed you to turn packet capture on or off.
    Ah yes I did not consider that attaching the packet sniffer would avoid the decryption.

    Perhaps running a mirror of the client on a virtual machine and do the sniffing from there?

    Rather then risk embarassing myself I dug up this article that explains what I am getting at:

    Setting up Port Mirroring to Capture Mirrored Traffic on a Hyper-V Virtual Machine | Networking Blog

    Let us take the following scenario as an example:

    Server1 and Server2 are two physical machines connected to a switch.
    HyperVServer is a the host which is also connected to the same switch.
    VM1 is a virtual machine running on the HyperVServer.
    All the above machines are part of the same network subnet. Port mirroring has been configured on the switch — to mirror any traffic on port Server2 is connected to –> to the port that HyperVServer is connected to.

    Now any communication happening between Server1 and Server2 can be captured from a packet sniffing software (say netmon) running on the HyperVServer.
    Last edited by naut333; 08-07-2018 at 05:40 PM.

  3. #168
    henrymiller's Avatar Member
    Reputation
    1
    Join Date
    Jul 2017
    Posts
    8
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by maper View Post
    I didn't mean that they banned for any open handles. Just ones that are tied to invasive software. They don't have to whitelist any software, it's easy to pick out anomalies across a playerbase if you just send back metadata about every process that has an open handle to the game.
    Yup, Ring3 rootkits would be such an anomaly that is likely present on multiple computers if your player base is large enough, still don't know if it's a ring3 rootkit, or a hack.

    Originally Posted by maper View Post
    Also, some game companies like Blizzard don't let you actually sign into a game if it detects certain anomalies, e.g. user-mode rootkits. Though it's mostly to avoid account takeover due to stolen credentials.
    Best case scenario! You instantly know they detect it, but you're just a user with poor security, not a filthy cheater who risks a ban.

  4. #169
    soalokinx's Avatar Member
    Reputation
    11
    Join Date
    Jun 2012
    Posts
    31
    Thanks G/R
    1/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    It was a good run. Thanks for the tool while it lasted! Was definitely my favorite program to run alongside Path. I never got banned for using it, but I stopped after the first wave of warnings went out. Cheers, hope to see more from you in the future.

  5. #170
    WodanOfElru's Avatar Member
    Reputation
    6
    Join Date
    Jun 2012
    Posts
    1
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Likewise, had a good run. Limited user & only ever used this, no warning.

  6. #171
    Zestro's Avatar Active Member
    Reputation
    57
    Join Date
    May 2012
    Posts
    166
    Thanks G/R
    6/12
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by amarat100 View Post
    Most valuable information at the moment is vendor crafting. If we can manage to understand how craft input/preview works, we probably (if they are not additionaly validating it) can spam-check all recipes in game. Im not C++ dev, don't know assembler either, but if given the api can pretty much do everything in C#

    If you can hook into it and provide Send/Callback Receive methods (just straight byte[] will be enough) as external API - it will be very useful.

    Can you write config file with basic regex matcher on packets (so i can filter heartbeat and everything else)?

    Found so far:
    0x0a - seems to be message in chat (just looked at hex values - it represented recent message from user in chat). Other information is probably chat related: global/local/etc, length, additionaly serialized identifiers of loot entity and so on.
    0xd5 - seems like packet with clickable entity id (chest, workbench, person), id is probably located at index 2-3-4-5, the rest (0xe5) received packages is probably information related to movement of character to this concrete entity as I see it when I simply move around or just stumble into wall (what especially interesting is that game not send movement package if you stumble into wall, so, if send and not validated at server - can result in wallhack).
    0xe5 - movement callback
    0x0e - skill continuous usage (while channelling it is send constantly, probably for heartbeat at server end), also send movement as skill
    0x62 - input into craft menu by Ctrl+left mouse click on item
    0x64 - output of craft menu (what will be aquired after accepting barter). Also if sent back - it is accept, and nothing else will be retrieved (so, content is drawed by information calculated in previous 0x64 message)
    ^^^^^^

    Did anything ever happen with this? I went through the whole thread in the hopes that something happened with this in the past year and found nothing. I'm sorry for the necro'ing of this thread but I would really love to hear if this ever took off and did you ever get a full crafting recipe list of vendor recipes?

  7. #172
    omnivore's Avatar Member
    Reputation
    4
    Join Date
    May 2016
    Posts
    39
    Thanks G/R
    47/3
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    GitHub - ncatlin/exileSniffer: A protocol decryption and dissection tool for the game 'Path of Exile' could be a resource for anyone progressing this method of data gathering

  8. #173
    kkooiu's Avatar Member
    Reputation
    1
    Join Date
    Aug 2018
    Posts
    7
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    seems doesn't work after the renderer update released.

Page 12 of 12 FirstFirst ... 89101112

Similar Threads

  1. [HACK] Undetected Warcraft 3 yHack (maphack, zoom hack etc..)
    By greenegzofyoshi in forum RTS Game Discussions
    Replies: 12
    Last Post: 1 Week Ago, 09:03 AM
  2. SwTor Server Packet logger 1.4 beta
    By the1domo in forum SWTOR Emulator Servers
    Replies: 16
    Last Post: 03-28-2012, 07:02 PM
  3. WoWProxy[UD Packet Logger]
    By [Shon3m] in forum World of Warcraft Bots and Programs
    Replies: 19
    Last Post: 05-06-2009, 08:50 PM
  4. WoWProxy[UD Packet Logger]
    By [Shon3m] in forum WoW EMU Programs
    Replies: 1
    Last Post: 04-30-2009, 04:20 PM
  5. fake programs loggers etc notice
    By dmc22 in forum Suggestions
    Replies: 0
    Last Post: 08-24-2008, 06:53 PM
All times are GMT -5. The time now is 05:27 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search