Strange, K should be here ... menu

User Tag List

Results 1 to 5 of 5
  1. #1
    Nishizono's Avatar Member
    Reputation
    1
    Join Date
    Feb 2008
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Strange, K should be here ...

    Hello, That's one week I work on WOW auth protocole, and now i've a little prob.

    I've see you can found the SessionKey with IDA just follow a subroutine using "COP_REALM" & etc...

    When I check it with IDA, I found 0x0C93424 (with 3.3.2) Client, but when I look memory with OllyDBG, I see memory (0x0C93424+508h = 0xC9392C) contains a large NULL byte field instead of 40 K bytes...

    Any ideas ?

    Strange, K should be here ...
  2. #2
    kynox's Avatar Account not activated by Email
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    That's because the auth is now handled by Battle.net.

  3. #3
    Nishizono's Avatar Member
    Reputation
    1
    Join Date
    Feb 2008
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    ah ok, that's why the client run different, and auth packets are differents when it connects to mangos or bliz serv.

    But in fact I'm wrong, the 0x0C93424 address refers to a pointer to the stack, and K is juste at [ptr_stack_addr+508h], I've found it on a mangos conn...

  4. #4
    XTZGZoReX's Avatar Active Member
    Reputation
    32
    Join Date
    Apr 2008
    Posts
    173
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    0x009D3260, is this what you're looking for? It's used in 0x0041C770 which seems to calculate the client seed sent in 0x1ED (CMSG_AUTH_SESSION). See 0x0041CA20.

    Edit: Err, nevermind. Irrelevant. Try 0x00C93424 + 0x508. 0x00C93424 is g_ClientServicesCurrent. Thanks to TOM_RUS for that one.
    Last edited by XTZGZoReX; 02-13-2010 at 10:23 PM.

  5. #5
    Nishizono's Avatar Member
    Reputation
    1
    Join Date
    Feb 2008
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    0x009D3260 is a stack adress, so randomized on vista, you don't get the same adress at each prog execution.

    So, see on the 0x00c93424 : you get (4 1st bytes) : 78 FA E9 09 (in example) -> (little endian) 0x09E9FA78 address to your g_ClientServicesCurrent pointer, add +508h (0X09E9FF80) and I found my key.

Similar Threads

  1. CE hacking - Where should I go from here?
    By Powerfox in forum Community Chat
    Replies: 1
    Last Post: 08-12-2010, 07:25 PM
  2. I dunno if it should go here or not >_>
    By RograuDK in forum WoW EMU Questions & Requests
    Replies: 2
    Last Post: 08-21-2009, 12:10 AM
  3. What should i do from here?
    By dontblink438 in forum WoW Scams Help
    Replies: 6
    Last Post: 12-21-2008, 07:13 AM
  4. Humm strange.. Look over here please!
    By jenix in forum World of Warcraft Model Editing
    Replies: 2
    Last Post: 12-05-2008, 11:43 AM
All times are GMT -5. The time now is 08:10 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search