[WoW][4.1.0.14007] Info Dump Thread menu

User Tag List

Page 3 of 4 FirstFirst 1234 LastLast
Results 31 to 45 of 51
  1. #31
    tymezz's Avatar Member
    Reputation
    9
    Join Date
    Nov 2007
    Posts
    44
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by -Ryuk- View Post
    Wheres the fun in that?
    Where's the point in that?

    [WoW][4.1.0.14007] Info Dump Thread
  2. #32
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Verletzer View Post
    ...or that you can disable it by changing one byte in the WoW binary.
    ...or you can just write code that doesn't suck.

  3. #33
    -Ryuk-'s Avatar Elite User CoreCoins Purchaser Authenticator enabled
    Reputation
    529
    Join Date
    Nov 2009
    Posts
    1,028
    Thanks G/R
    38/51
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Cypher View Post
    ...or you can just write code that doesn't suck.
    My point exactly :P

    Anyway, Cypher I could do with having a chat with you. I believe you know a lot more about warden then I do, and I could do with passing my idea by you.
    |Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|

  4. #34
    Cypher's Avatar Kynox's Sister's Pimp
    Reputation
    1358
    Join Date
    Apr 2006
    Posts
    5,368
    Thanks G/R
    0/6
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by -Ryuk- View Post
    My point exactly :P

    Anyway, Cypher I could do with having a chat with you. I believe you know a lot more about warden then I do, and I could do with passing my idea by you.
    I don't work on WoW anymore. Unless it's a relatively generic question I'm unlikely to be of much help.

  5. #35
    Verletzer's Avatar Private
    Reputation
    11
    Join Date
    Apr 2011
    Posts
    11
    Thanks G/R
    0/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    The reason for the patch is to enable IDA to attach more quickly. If ASLR is enabled, you need to wait for it to rebase the program every time it attaches.

  6. #36
    -Ryuk-'s Avatar Elite User CoreCoins Purchaser Authenticator enabled
    Reputation
    529
    Join Date
    Nov 2009
    Posts
    1,028
    Thanks G/R
    38/51
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Cypher View Post
    I don't work on WoW anymore. Unless it's a relatively generic question I'm unlikely to be of much help.
    Well, Ill go ahead and ask anyway.

    Currently my warden scanner only looks at memory scans; does warden physically access every dll that is injected into wow? If so could it be detoured just like I am doing for the memory scans?

    Thanks
    |Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|

  7. #37
    TOM_RUS's Avatar Legendary
    Reputation
    914
    Join Date
    May 2008
    Posts
    699
    Thanks G/R
    0/52
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by -Ryuk- View Post
    Well, Ill go ahead and ask anyway.

    Currently my warden scanner only looks at memory scans; does warden physically access every dll that is injected into wow? If so could it be detoured just like I am doing for the memory scans?

    Thanks
    Yes, it scans every dll loaded into wow process at specific offsets (offsets+size of data sent by server), hashes data and checks against hash received from server.
    No idea about detouring, but I assume if you can do that for memory scans, it also possible for dll scans...

    Some pseudo code:
    Code:
    uint offset; // received from server
    byte size; // received from server
    var hmac = new HMACSHA1(seed); // seed is random 4 bytes, also received from server
    var data = ReadBytes(dll_base_adddress+offset, size);
    var hash = hmac.ComputeHash(data); // compute client side hash
    if(hash == serverHash) // compare client hash with hash received from server
        // module adds 0xE9 to it's CMSG_WARDEN_DATA response packet
    else
        // never bothered to check what it sends to server if hash doesn't match
    Last edited by TOM_RUS; 05-22-2011 at 05:29 AM.

  8. #38
    tymezz's Avatar Member
    Reputation
    9
    Join Date
    Nov 2007
    Posts
    44
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by -Ryuk- View Post
    Well, Ill go ahead and ask anyway.

    Currently my warden scanner only looks at memory scans; does warden physically access every dll that is injected into wow? If so could it be detoured just like I am doing for the memory scans?

    Thanks
    Do you mean perform a cheksum on modules loaded into the process? I'm not sure if they do that currently, but you're safe as long as you dont release anything.

    edit: TOM_RUS wins.

  9. #39
    -Ryuk-'s Avatar Elite User CoreCoins Purchaser Authenticator enabled
    Reputation
    529
    Join Date
    Nov 2009
    Posts
    1,028
    Thanks G/R
    38/51
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by TOM_RUS View Post
    Yes, it scans every dll loaded into wow process at specific offsets (offsets+size of data sent by server), hashes data and checks against hash received from server.
    No idea about detouring, but I assume if you can do that for memory scans, it also possible for dll scans...

    Some pseudo code:
    Code:
    uint offset; // received from server
    byte size; // received from server
    var hmac = new HMACSHA1(seed); // seed is random 4 bytes, also received from server
    var data = ReadBytes(dll_base_adddress+offset, size);
    var hash = hmac.ComputeHash(data); // compute client side hash
    if(hash == serverHash) // compare client hash with hash received from server
        // module adds 0xE9 to it's CMSG_WARDEN_DATA response packet
    else
        // never bothered to check what it sends to server if hash doesn't match
    Thank you.

    So if am understanding this correctly. It does the following:

    Find dll base,
    Adds offset,
    Reads the data according to the size,
    Converts this into a hash,
    Checks this hash with the one from the warden server,
    Replys with the result,

    and starts again.

    Looks like I need to find where this scan takes place then, so I can detour it and peak at the results
    |Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|

  10. #40
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    TOM_RUS,

    what about asm injection, for instance an allocated memory region not allocated by wow? Is there any jumping around with memory query functions?

  11. #41
    -Ryuk-'s Avatar Elite User CoreCoins Purchaser Authenticator enabled
    Reputation
    529
    Join Date
    Nov 2009
    Posts
    1,028
    Thanks G/R
    38/51
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    TOM_RUS,

    what about asm injection, for instance an allocated memory region not allocated by wow? Is there any jumping around with memory query functions?
    Yes, I believe this is how eBot got its banwave.

    Its good practice to randomize(but not too much) the size of your codecave, and to randomize your asm.

    Although I could be wayyy wrong :P
    |Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|

  12. #42
    TOM_RUS's Avatar Legendary
    Reputation
    914
    Join Date
    May 2008
    Posts
    699
    Thanks G/R
    0/52
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    TOM_RUS,

    what about asm injection, for instance an allocated memory region not allocated by wow? Is there any jumping around with memory query functions?
    I have a feeling that it does VirtualQuery or whatever it is to get wow memory map and then scans that whole thing using method I posted above. So it's not just DLL's...

  13. #43
    Verletzer's Avatar Private
    Reputation
    11
    Join Date
    Apr 2011
    Posts
    11
    Thanks G/R
    0/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Finding code injected by almost every bot/hack is easy. Almost all cheats use BlackMagic for allocating memory in the target process. The problem is that the memory is always allocated with PAGE_EXECUTE_READWRITE permission and is never changed to PAGE_EXECUTE_READ. WoW has a section of memory with the same permission (tsk tsk) but it can easily be filtered out. When memory is allocated via VirtualAlloc(Ex), "BaseAddress" will be equal to "AllocationBase" (see code below). You can iterate through all the allocated memory regions in a few milliseconds.

    Code:
    ULONG_PTR addressOffset = 0;
    MEMORY_BASIC_INFORMATION memInfo;
    
    while(VirtualQuery((LPCVOID)addressOffset, &memInfo, sizeof(MEMORY_BASIC_INFORMATION)) != 0){
       if((memInfo.State != MEM_FREE) &&
          (memInfo.Protect == PAGE_EXECUTE_READWRITE) &&
          (memInfo.BaseAddress == memInfo.AllocationBase) &&
          (memInfo.RegionSize != 0)){
    	//Process suspicious memory...
       }
       addressOffset += memInfo.RegionSize;
    }

  14. #44
    xalcon's Avatar Contributor ふたなり
    Authenticator enabled
    Reputation
    198
    Join Date
    Oct 2008
    Posts
    291
    Thanks G/R
    20/58
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Hey guys, ' want to contribute something too
    Unit_Name1 = 0x91C // found by TOM_RUS, thanks
    Unit_Subname = 0x4 // Jep... this was hard... since Unit_Name2 is @ 0x60 :P
    Unit_Subname = [[ObjBase + UnitName1] + UnitSubname]

  15. #45
    erix920's Avatar Private
    Reputation
    4
    Join Date
    Mar 2011
    Posts
    11
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Has subzone and zone changed? I thought I used to read an offset and it would give the text but now with the new offsets it doesn't work. Am I not suppose to read as ASCII?

Page 3 of 4 FirstFirst 1234 LastLast

Similar Threads

  1. [WoW][3.3.5.12340] Info Dump Thread
    By Nesox in forum WoW Memory Editing
    Replies: 97
    Last Post: 4 Weeks Ago, 08:59 AM
  2. [WoW][4.0.3.13329] Info Dump Thread
    By TOM_RUS in forum WoW Memory Editing
    Replies: 73
    Last Post: 02-06-2011, 06:37 AM
  3. [WoW][4.0.1.13164] Info Dump Thread
    By Seifer in forum WoW Memory Editing
    Replies: 29
    Last Post: 01-18-2011, 09:14 AM
  4. [WoW][4.0.1.13205] Info Dump Thread
    By DrGonzo in forum WoW Memory Editing
    Replies: 12
    Last Post: 11-11-2010, 02:34 PM
  5. [WoW][3.3.3.11723] Info Dump Thread
    By miceiken in forum WoW Memory Editing
    Replies: 2
    Last Post: 03-27-2010, 04:42 PM
All times are GMT -5. The time now is 09:17 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search