Once again (where to find packet parse function for wsarecv call) menu

User Tag List

Results 1 to 4 of 4
  1. #1
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Once again (where to find packet parse function for wsarecv call)

    I have to ask again, are there any good reversers, who can help me to find the packet parse function within eso? WSARecv is called, the data is put somewhere in memory and then this first task is done. Some other "thread" works with the read data, but i can't find it's origin.

    All my attempts failed. Exe is crashing when hooking to wsarecv or attaching debugger with hw or sw breakpoint at that call. Tried olly 1,2 and ida. Also procmon doesn't show any wsarecv calls in stack. Are there other ways to find that parsing function? Packet's structure is length plus some opcode plus data.

    Thx for helping me or giving me some hints on doing.

    Once again (where to find packet parse function for wsarecv call)
  2. #2
    races's Avatar Corporal
    Reputation
    1
    Join Date
    Jan 2014
    Posts
    22
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Just use ida python script shared by blar0 few weeks ago.
    Or every opcodes has his own vtable :
    * destructor
    * Serializer function
    * *DE*Serializer function
    * Dummy
    * Getter (return the num of the opcode).
    For example the getter of the opcode 0x105 should be :
    mov eax, 105h
    retn
    just grep B8 05 01 00 00 C3 in IDA (unpacked version), look at the xref you should find the vtable and the serializer and deserializer when they exist.

  3. #3
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Thx so far! Through your description i've found the places, where the data, which will be send from client is being processed (e.g. 0x2B10, 0x2B0A). When attaching olly, and setting a bp, it works.

    But... When putting bp on the received opcodes from server (0x2B08, 0x2B12, 0x0115, ...) they are never called. Any idea why? Or are the receiving opcode otherwise parsed? Have ya got addresses where these one are handled?

    Greetings...

  4. #4
    Esoserv2's Avatar Sergeant
    Reputation
    8
    Join Date
    Jan 2014
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Esoserv2 View Post
    But... When putting bp on the received opcodes from server (0x2B08, 0x2B12, 0x0115, ...) they are never called. Any idea why? Or are the receiving opcode otherwise parsed? Have ya got addresses where these one are handled?
    I've to answer myself. When i haven't take the wrong turn, then these opcodes are now loaded from ressource(dat) files. That's my final thought for not to find them in static unpacked exe. This makes it in fact harder to get the right functions.

Similar Threads

  1. [Guide] Where to find the Dwemer Motifs for ESO Dwemer Armor Set?
    By junired in forum Elder Scrolls Online Guides
    Replies: 0
    Last Post: 11-11-2014, 04:32 AM
  2. Where to find Striker's .blp-files?
    By Violence in forum World of Warcraft Model Editing
    Replies: 3
    Last Post: 10-04-2006, 05:56 PM
  3. Once again: DO NOT USE HACKS AT THIS TIME!
    By idusy-org in forum OC News
    Replies: 27
    Last Post: 09-27-2006, 08:16 PM
  4. Where to Find Mac auto mouse clicker
    By socaboy in forum World of Warcraft General
    Replies: 3
    Last Post: 09-13-2006, 03:04 AM
All times are GMT -5. The time now is 07:00 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search