WoWMimic Detection (Again) menu

User Tag List

Page 7 of 8 FirstFirst ... 345678 LastLast
Results 91 to 105 of 106
  1. #91
    Zeluous's Avatar Active Member
    Reputation
    61
    Join Date
    Dec 2008
    Posts
    423
    Thanks G/R
    0/3
    Trade Feedback
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    I agree. I have given up on Mimic peroid.

    WoWMimic Detection (Again)
  2. #92
    KuRIoS's Avatar Admin
    Authenticator enabled
    Reputation
    2984
    Join Date
    Apr 2006
    Posts
    9,811
    Thanks G/R
    353/298
    Trade Feedback
    9 (100%)
    Mentioned
    5 Post(s)
    Tagged
    1 Thread(s)
    Originally Posted by LegacyAX View Post
    @cypher...

    Im sure by now you know, But Mimic is 100% detected on live servers since 3.1.2 , I know you didnt submit anything yet (keyword: 'yet') But you were right, ALOT of mimic users were insta-banned today, and it def. wasnt froma simple kids reporting to a GM, Many of the cases I read today were exactly when Mimic say "gathering data from wow" (translated: "Injecting melete.dll into wow...." xD ) and they user got a Disconnect, then Insta-Ban *BAM* Ban Hammer falls and they cant login... So the noob rushes to IE, and goes to his Gmail acc(s) to look for the....dom dom dahhhh!!! Account Closure Email!

    Due to the use of Third party software.......


    ughh... AND to make it EVEN worse! This was with their NEWEST release .45! That means they didnt take ANYTHING serious after reading/hearing about your post or other reverser warnings!

    Well TBH ... Im really Not surprized.... More or less disappointed that they didnt take anyone who knows a shits warnings seriously.. and DO SOMETHING ABOUT IT!! Now look what you did...Banned all your users... (lol)

    All in all. I agree with cypher, Due to the fact that they have always claimed to be 'safe' and 'undetected' etc... Then did nothing about it when it there were CLEAR signs in the PTR showing mimic was being scanned for.... Like seriously come on...

    Anyway good shit.... Peace out.

    -L_AX
    Im sorry but i just dont think they have the skills... :confused:

  3. #93
    ramey's Avatar Member
    Reputation
    45
    Join Date
    Jan 2008
    Posts
    320
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by LegacyAX View Post
    -L_AX
    Lol'd .

  4. #94
    Hellson's Avatar Contributor

    Reputation
    109
    Join Date
    Jul 2007
    Posts
    407
    Thanks G/R
    7/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    but but.....they have the BEST CHINESE GAME HACKER!

    Thanks to Mit0 for the sweet Sig!
    Plays Warcraft far too much

  5. #95
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    First, OOP scanning is 100% stealthable (but not 100% unblockable) from user mode (which is why a lot of the most paranoid folks stay OOP, despite how much more of a pain it is). It's a cat-and-mouse game, but until WoW goes kernel (or begins exploiting some of the privilege escalation loopholes in Windows), there are ways to 100% "jail" WoW from looking at other processes. E-peens aside, it is possible to completely block a process from accessing meaningful/useful info in another process' address space. Kernel drivers (on older Windows) can do this. Wine (on Linux) can do this. Heck, unless you use a privilege escalation hack, it's possible to almost completely stealth an OOP process in user mode just by running WoW as a restricted account (stealthing windows is harder due to Windows' insecure desktop design, but even there some common-sense precautions can help).

    In-process is much trickier. Again, if you can get into the kernel you can (for the most part) "win" the arms race between developer and RE, but once you're in-process there are many, many more loopholes to close (as even the relatively simple module cloaker shows: forgetting to zero an init structure hint leaves you open).

    Ultimately, it's not useful to talk about 100%'s -- nothing is 100% undetectable (I guarantee you), nor is any detection technology 100% reliable (again, I guarantee you). I don't really know this whole WoW Mimic kerfluffle, but if they were bragging about 100% stealth -- yeah, that's like waving a red flag before a bull.

    There are what is called "class breaks" on an entire class of security methods that would render them theoretically useless. For instance, going kernel is a class break on using ZwQueryVirtualMemory, since it can be detoured in-kernel without any modifications to the user space at all. In effect that particular technique -- ZwQueryVirtualMemory -- becomes useless (of course this introduces OTHER detection techniques, such as scanning for kernel hooks, but that's not the point -- often those anti-anti-anti-RE methods are unreliable or prohibitively expensive/buggy/false-positive prone). The mem encryptor code I'm working on is a class break for a code-hashing attack by Warden, if my encryption is good (for instance, if I use a one-time pad as big as the code space, it is unbreakable even in theory). It leaves open other attack vectors (hashing on the call gate, for instance, or behavioral techniques such as looking for hidden memory blocks, etc.), but the actual hashing of code would have a crypto-secure class break. In other words, Warden could never use that particular anti-reversing method again (but -- and this is important -- ONLY that particular method; they could still hash common detours since the detours wouldn't be encrypted, or as I mentioned, they could hash the call gate).

    A lot of what's going on in the "war" between RE's and Warden dev's very much parallels the arms race that's led to the increasing sophistication of computer virii; my idea of self-encryption is just stealing a proven technique from virus writers, and my idea of making the call gate metamorphic is another such virus technique. The reason I picked them is because they are proven class-breaks against signature scanning. Implementing them (correctly) would require Warden to work more towards heuristic and behavioral detection (which is much, much more complicated, as AV vendors have discovered, and which, frankly I doubt Blizzard is either capable or willing to do). Once code signature detection is class-broken, Warden's entire method of signature scanning will only ever catch script kiddies who don't know about the self-encrypting/decrypting PE techniques. (Note that there will still be an arms race on the metamorphic call gate).

    So what this long-winded rant is getting towards is: security is not simple, whether you're implementing it, or breaking it. Ultimately, Warden will lose, since ultimately physical control of the machine will win the day (just running an ICE that does what you want would permanently class-break almost all of Warden, but almost nobody has this kind of equipment). But many people wil fall by the ban-bat in the meantime, since this is an arms race, and at certain times either "side" will (temporarily) have superiority. Bottom line is, if you can't take the heat -- the possibility of being detected at ANY time -- you shouldn't be in the sandbox. And people who don't understand security and OS internals well -- as Cypher demonstrated the Mimic folks DIDN'T -- shouldn't even be playing in the sand; they're likely to be early victims.

    I do have one minor quibble with the prevailing sentiment, however. If botting is itself morally objectionable, then why would anyone be on a public forum devoted to helping folks write bots? I mean that's like saying "drugs are evil, but I'm going to manufacture and distribute information on manufacturing bathtub LSD." Teensy bit of a conflict there.

    Me, I don't think bots are in any way immoral (or I wouldn't be on the forum). I just think they're against Blizz's rules (different thing entirely), and know that I always risk detection when I run my little penny-ante bots. But then again, I'm not stupid enough to a) distribute my bot publicly and b) then claim it's "completely undetectable." That's just dumb...
    Last edited by amadmonk; 05-20-2009 at 03:57 PM.

  6. #96
    mordok's Avatar Member
    Reputation
    11
    Join Date
    Oct 2007
    Posts
    103
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Aamen.

    In my country we have and old proverb. "Made the law, made the hole" - Well translations never are as cool as orginals, but still have the same point. Each time someone develops an anti cheat, you can develop an anti anti cheat... and so on. As amadmonk sed lets hope that by having direct controll of the machine, RCEs should have an advantage over DEVs

    (Note: not full machine control unless your are on linux + wine thou)
    "I'm not going to expose my methods for time bending, as i don't want to do get nerfed!"-Kynox

  7. #97
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Today is awesome. I'm loving the fact that all the Mimic idiots have to eat their own words.

  8. #98
    Cursed's Avatar Contributor
    Reputation
    270
    Join Date
    Jun 2007
    Posts
    1,380
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Cypher View Post
    Today is awesome. I'm loving the fact that all the Mimic idiots have to eat their own words.
    You rather write here, than in your blog about it?

  9. #99
    Hellson's Avatar Contributor

    Reputation
    109
    Join Date
    Jul 2007
    Posts
    407
    Thanks G/R
    7/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    So it's updated and detected? daaaaaaaaaamn

    Thanks to Mit0 for the sweet Sig!
    Plays Warcraft far too much

  10. #100
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    @amadmonk:

    Isn't kernel-mode programming a little bit dead since patchguard came to be? They fixed the bug where you could overwrite the paging files, or at least that's what I read. Are there other ways? Or can you still load w/e you want if you disable driver signing, and I'm just misunderstanding what it does. Does it just check if you're using ssdt hooks or detouring ntdll funcs?
    Last edited by lanman92; 05-20-2009 at 10:33 PM.

  11. #101
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by lanman92 View Post
    @amadmonk:

    Isn't kernel-mode programming a little bit dead since patchguard came to be? They fixed the bug where you could overwrite the paging files, or at least that's what I read. Are there other ways? Or can you still load w/e you want if you disable driver signing, and I'm just misunderstanding what it does. Does it just check if you're using ssdt hooks or detouring ntdll funcs?
    Disabling signing doesn't disable KPP. Also, KPP does a lot more than just look for SSDT hooks. Also, NTDLL is a usermode component.

    EasyHook has a KPP bypass, but all the public bypasses always get patched, so don't rely on them.
    EasyHook - The reinvention of Windows API Hooking - Home

  12. #102
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    You sound like you have a few private ones :P I might just install a VM with WinXP 32-bit and see if I can get some fireworks, though. Either that or...wine...

  13. #103
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by lanman92 View Post
    @amadmonk:

    Isn't kernel-mode programming a little bit dead since patchguard came to be? They fixed the bug where you could overwrite the paging files, or at least that's what I read. Are there other ways? Or can you still load w/e you want if you disable driver signing, and I'm just misunderstanding what it does. Does it just check if you're using ssdt hooks or detouring ntdll funcs?
    Actually, I was talking about something even more prosaic than what Cypher discusses: you can still just run XP. It's still legal

  14. #104
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by lanman92 View Post
    You sound like you have a few private ones :P I might just install a VM with WinXP 32-bit and see if I can get some fireworks, though. Either that or...wine...
    Sadly, last time I checked, none of the VM's had good DX emulation (although VMWare was working on it and had a beta... it might be production-quality by now). That would be fairly ideal from a sandboxed hacking perspective...

  15. #105
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    They have it down decently last time I checked. They just have issues with DInput. You can't use the mouse to turn if you're in vmware using DX. I used glider in my VM and it worked pretty well actually. Forgot the pass to that VM... rofl. Have you worked with Wine at all? I'd hate to make my own tools, but that might actually be pretty cool.

Page 7 of 8 FirstFirst ... 345678 LastLast

Similar Threads

  1. Bots Down... again!?!?!?
    By faatnntaaf in forum Pokemon GO Hacks|Cheats
    Replies: 125
    Last Post: 08-08-2016, 12:33 AM
  2. Confirmation Of Korean Or Chinese Hacks Detected
    By FusionStream in forum Overwatch Exploits|Hacks
    Replies: 2
    Last Post: 08-05-2016, 10:21 PM
  3. Detected Cheater Poke Advisor !
    By klonoaop in forum Pokemon GO Hacks|Cheats
    Replies: 20
    Last Post: 08-05-2016, 03:56 AM
  4. More WoWMimic Pwnage (Yes.. Again..)
    By Cypher in forum WoW Memory Editing
    Replies: 17
    Last Post: 05-15-2009, 09:19 AM
All times are GMT -5. The time now is 06:43 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search