Jump to content

DragonHunter

Legendary Member
  • Posts

    596
  • Credits

  • Joined

  • Last visited

  • Feedback

    0%

Everything posted by DragonHunter

  1. Yooo folks haven't posted here for years whatsup just a beta preview of my new program L2MITM Lineage2 - Man In The Middle This program is able to dump the username and password of the person who is going to login The program decrypts the RSA-1024bit, Blowfish, Xor encryption of the game Just a early stage of the project, It's also having a simple plugin system so you're able to do a lot and have fun with scripting different stuff For now I made a plugin that will dump the username and password to a file And a other plugin that would attack the next monster when you killed it (bot) You could make a lot outta this :) Haven't been doing some gamehacks for such time so why not I thought I'd be also funny to break to spoof the RSA Key so I was able to decrypt the username and password hehe ^_^ Haven't seen anyone so far breaking the RSA for this game so maybe I'm the first 1 Breaking the RSA 1024bit costed me 2 full days messing around with spoofing it and setting all the offsets correct etc Note: No game hooks are being used, the program is written 100% in C# Video: L2MITM Beta Preview I think I'll release this program soon when I'm completely done with the plugin system etc Oh well stay tuned for updates :good sir: Maybe people remember my L2PacketX, well this 1 can do more stuff soon
  2. Just copy ur accounts table to another database like 'test' and change in the design access_level to accessLevel and thats the fix :P
  3. ok for the noobs that still dont understand anything... fillin the username/password/database/ip connect to the database and it will get a list with usernames from the players and it will try to crack the passwords this was just for education only so use it at ur local database !
  4. http://www.youtube.com/watch?v=EaNmQ6R04hk some preview of the program...
  5. you must install .net framework 3.5 http://www.microsoft.com/downloads/details.aspx?FamilyId=333325fd-ae52-4e35-b531-508d977d32a6&displaylang=en
  6. Ok this is a new program i made in C# it will use a wordlist to crack the l2j passwords This will require a mysql database with the table 'accounts' It will load all the usernames and it will try to crack all the passwords from the usernames Have fun 8) I also made a wordlist of 1.373.238 words i made some long time ago... this is included with the l2j password cracker Download: http://www.4shared.com/file/3kvDgHIn/L2J_Password_Cracker.html
  7. Soon a l2j password bruteforcer will come... be patient :D
  8. Ok since maxtor still didnt made those sections cuz i dunno why... or he dont want to make those sections whatever but anyways #include <detours.h> //Prototype of the original ShellAboutW API int (__stdcall *ShellAboutWD_o)( HWND hWnd, LPCWSTR szApp, LPCWSTR szOtherStuff, HICON hIcon); //Hooked ShellAboutW API int __stdcall ShellAboutWD(HWND hWnd, LPCWSTR szApp, LPCWSTR szOtherStuff, HICON hIcon) { return ShellAboutWD_o(hWnd, L"DragonHunter [LeetCoders]", L"The about API/Function is hooked by DragonHunter ;D!", hIcon); //Return to original api function } BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: HANDLE ShellAboutWDProcessAddress; //Hold the ShellAboutW API memory address ShellAboutWDProcessAddress = GetProcAddress( GetModuleHandle(L"Shell32"), //DLL Library "ShellAboutW" //API/Function ); //Since we now have the memory address of ShellAboutW we can finally start the hook process :) if(ShellAboutWDProcessAddress != 0) //Check if memory address is found (Error-Handling) { ShellAboutWD_o = ( //Set the original API/Function int (__stdcall *)( //Prototype HWND hWnd, LPCWSTR szApp, LPCWSTR szOtherStuff, HICON hIcon)) //Prototype DetourFunction( //Api-Hook ShellAboutW (PBYTE)ShellAboutWDProcessAddress, //Get memory address (PBYTE)ShellAboutWD); //Set ShellAboutWD_o -> ShellAboutWD } break; case DLL_PROCESS_DETACH: if(ShellAboutWDProcessAddress != 0) { DetourRemove( (PBYTE)ShellAboutWDProcessAddress, //Unhook the API/Function (PBYTE)ShellAboutWD); } break; } return TRUE; } And this is the output Have fun... Coded by DragonHunter
  9. wtf? its not about l2 its about the forum read next time lol'd
  10. http://www.youtube.com/watch?v=_8J7hkHGDUs Comment + Rate written in C++...
  11. 100 euro ? what do you need... a rootkit ? just pm me what you need and ill see if i can make it for you
  12. We have in this forum 68.597 Members and there are just daily 1000 members online Is this a fail or win ?
  13. btw did you thought about encrypting ur EOF data ? I don't if u did that but should be better :P
  14. lol thats just a virus scan of the .rar file thats always shown virusless -.-'
  15. lol i thought you said it will not be posted for free :P FAIL xD
  16. lol just join hackforums ... they got everything already :P
  17. lol that sucks... so your just dumping the virus on the pc and it will become detected Useless :P
  18. ye it was realy insane... but funny at the sametime when i was online in that server lol:P
  19. have fun listening/watching :D Ye i recorded this ::)
  20. you don't read or you dont understand english... but read the first fuckin post -.-' The virus scan will show that there is a virus but there is not because i've protected my program realy hard this time to be sure some dum asses can't get the source code from it!
  21. If you did read you knew that he was not able to connect to the database... doesnt matter if username or password is then incorrect
×
×
  • Create New...