Hello! I have been REing WOW for a while now and I still cant find the Encryption code in the source. I know that WOW calls WS2_32 send around 4-5 times from different locations, and I have been working backwards from those locations but I still can not for the life of me find any type of loop within the code that would resemble a scramble of bytes.
I am going backwards from 0x013B6DA7, and I still can't find any type of loop that would resemble RC4 encryption. I have cracked many RC4 encryption game programs before so I know what I have to look for but I just cant find it. I think this is mostly because I can not break-point nor hardware break-point World Of Warcraft.
My goal is to find the code that takes an unmodified packet and starts encrypting it. Help would be appreciated.
(VERSION: 4.2.0.14480)
Code:
013B6DA7 . 8B17 MOV EDX,DWORD PTR DS:[EDI]
013B6DA9 . 83C4 04 ADD ESP,4 ; Below leads to SEND
013B6DAC . 50 PUSH EAX ; |Arg3
013B6DAD . 8D8D ECBDFFFF LEA ECX,DWORD PTR SS:[EBP+FFFFBDEC] ; |
013B6DB3 . 51 PUSH ECX ; |Arg2
013B6DB4 . 52 PUSH EDX ; |Arg1
013B6DB5 . E8 067D0200 CALL Wow.013DEAC0 ; \Wow.013DEAC0
013B6DBA . 83C4 10 ADD ESP,10
013B6DBD . 85C0 TEST EAX,EAX
013B6DBF . 0F85 E8000000 JNZ Wow.013B6EAD ; Jump To Z
013B6DC5 . 8B0F MOV ECX,DWORD PTR DS:[EDI] ; Below leads to RECV
013B6DC7 . 68 FF1F0000 PUSH 1FFF ; /Arg3 = 00001FFF
013B6DCC . 8D85 ECDDFFFF LEA EAX,DWORD PTR SS:[EBP-2214] ; |
013B6DD2 . 50 PUSH EAX ; |Arg2
013B6DD3 . 51 PUSH ECX ; |Arg1
013B6DD4 . E8 E77D0200 CALL Wow.013DEBC0 ; \Wow.013DEBC0