Jump to content

Recommended Posts

Posted

And if you want to know if i made this... i can make you a tutorial step by step what i have done on comclt32.dll to make my system work...

And most of all i didn't care on share this thing and be famous in here...those last days i started posting in these forum...

I shared my work..i don't care about copyrighting it...

But next time i think i must add my signature because most of you people don't appreciate...

Some Donators in here know me in real life...and they know about my knowledge

 

Update :

About Sublimity protection the only login difference between other servers is that the blowfish is inside comclt32.dll instead of engine.dll...

Normally engine.dll push the blowfish to pass gameserver but for this server the fuction is called from comclt32.dll

I don't know if this .dll sends any other packet to be acceptable from the server

So making L2walker OOG calling fuctions from my modified comclt32.dll might be an option...

I have to try

I commonly working with attached hacks on L2.exe but L2walker OOG is stand alone...and i have to learn  where to import those fuctions..

Most of all i dont care about OOG because i think that IG is the best...

WHAT?! lol.

 

Why the hell would you need to have your modified dll have anything to do with walker? If you know the new blowfish key then you just need to change L2Walker's default key to match, which btw is only used for the login, not the gameserver.

 

Grats to you for your share, I'm not trying to seem like one of the people you discribed in your post, but my only problem came when I saw "but it might be tricky cause of the login steps of this server..." which showed an extreme lack of knowledge or research with Sublimity's protection, and I have a problem with the large amount of people who come on here with a modicome of knowledge and brainwash all the 13 year olds into thinking they are god when 90% of the time they haven't actually done anything, however, I am not saying you are one of those people.

Posted

WHAT?! lol.

 

Why the hell would you need to have your modified dll have anything to do with walker? If you know the new blowfish key then you just need to change L2Walker's default key to match, which btw is only used for the login, not the gameserver.

 

Grats to you for your share, I'm not trying to seem like one of the people you discribed in your post, but my only problem came when I saw "but it might be tricky cause of the login steps of this server..." which showed an extreme lack of knowledge or research with Sublimity's protection, and I have a problem with the large amount of people who come on here with a modicome of knowledge and brainwash all the 13 year olds into thinking they are god when 90% of the time they haven't actually done anything, however, I am not saying you are one of those people.

 

Look...

I sniffed the packets from the server with the normal system of sublimited and i saw that the blowfish is pushed while entering the L2 World...Wrong blowfish after character selection and you take a disconnect...

After unpacking and searched inside comclt32.dll i saw that the key is in this dll...

Firstly i tried to use bfishy.dll from fyyre but nothing changed..Comclt32.dll is a must to connect to server like that..Original name of this dll is ClientEX.dll don't thing that is COMCLT32.dll that exists in System32

So i make this dll importable for my new client...where Zero guard does not exists...

After a big search that i have done i found that this dll was asking for l2walker clients and if they found then terminates them..So i modified this module more..

I know where the blowfish normaly pushed but this modified client that they make is using different login method than normal clients do... So thats why i m talking about login steps..

Protections on lineage servers have taken a  different road from simple antibots that can found running procceses on computer...

 

_________________________________________________________

 

There's a masterpiece antibot with a completly changed server Authd (Kasha Protection Module) that packet are crypted with alogorithms that makes them completely unreadable.

L2walker OOG or a system with the correct settings (blowfish,Ip address,and port) will never communicate with those servers until these crypt/decrypt algorithms on packet send/recieve are added..In game packets are staying the same...but the login engine is something that they can make it work as they want...

Don't stay in thinking that things on login are always the same..

 

Posted

use a Virtual Machine and HotSpotShield or any other proxy/VPN client So u have different IP´s and HWID´s. Then u can 4box ;)

OR use more then 1 pc :D

can u post more detailed info for this?

Posted

Look...

I sniffed the packets from the server with the normal system of sublimited and i saw that the blowfish is pushed while entering the L2 World...Wrong blowfish after character selection and you take a disconnect...

After unpacking and searched inside comclt32.dll i saw that the key is in this dll...

Firstly i tried to use bfishy.dll from fyyre but nothing changed..Comclt32.dll is a must to connect to server like that..Original name of this dll is ClientEX.dll don't thing that is COMCLT32.dll that exists in System32

So i make this dll importable for my new client...where Zero guard does not exists...

After a big search that i have done i found that this dll was asking for l2walker clients and if they found then terminates them..So i modified this module more..

I know where the blowfish normaly pushed but this modified client that they make is using different login method than normal clients do... So thats why i m talking about login steps..

Protections on lineage servers have taken a  different road from simple antibots that can found running procceses on computer...

 

_________________________________________________________

 

There's a masterpiece antibot with a completly changed server Authd (Kasha Protection Module) that packet are crypted with alogorithms that makes them completely unreadable.

L2walker OOG or a system with the correct settings (blowfish,Ip address,and port) will never communicate with those servers until these crypt/decrypt algorithms on packet send/recieve are added..In game packets are staying the same...but the login engine is something that they can make it work as they want...

Don't stay in thinking that things on login are always the same..

 

I say again

 

WHAT?! lol

 

I'm going to ignore the fact that you are completely oblivious to L2Sublimity's actual protection methods because that pales in comparison to the fact that you think Kasha's protection is a masterpiece...

 

Let's start off with the first part, how does adding extra encryption on the login packets only make it a masterpiece? It's not like you even need to know the actual algorithm that hes using considering you could copy/paste his enc/dec functions and replicate it yourself.

 

And you even said it yourself, the ingame packets are the same, completely untouched, do you know how -beep-ing retarded that is?! That means all you have to do is login past server-selection and then pause or completely remove Kasha's protection module and then manually inject l2walker.dll into the client.

 

This is the exact same shit as bake-ice, protecting only the auth which leaves absolutely no room for verification that the protection module is even running once the player has reached the world. PATHETIC.

 

Did you even know that L2Walker and L2.Net can be defeated by changing 3 packet opcodes and then correcting them in the client by changing the addresses on the packet handler table rather than immidiately post-decryption? If L2Sublimity's opcode scrambling function acted on the handler table instead then your current dll still wouldn't allow walker to work as it wouldn't be able to determine which packet is which and would just /fail all over itself.

 

 

These protections are crap, pieces of shit made by kids who have no idea what they are doing. All of this stupid -beep-ing dll systems that are all bypassable with even the smallest amount of reverse engineering knowledge. When someone makes a ring-0 driver protection system with self-defense THEN you may call it a masterpiece.

Posted

I say again

 

WHAT?! lol

 

I'm going to ignore the fact that you are completely oblivious to L2Sublimity's actual protection methods because that pales in comparison to the fact that you think Kasha's protection is a masterpiece...

 

Let's start off with the first part, how does adding extra encryption on the login packets only make it a masterpiece? It's not like you even need to know the actual algorithm that hes using considering you could copy/paste his enc/dec functions and replicate it yourself.

 

And you even said it yourself, the ingame packets are the same, completely untouched, do you know how -beep-ing retarded that is?! That means all you have to do is login past server-selection and then pause or completely remove Kasha's protection module and then manually inject l2walker.dll into the client.

 

This is the exact same shit as bake-ice, protecting only the auth which leaves absolutely no room for verification that the protection module is even running once the player has reached the world. PATHETIC.

 

Did you even know that L2Walker and L2.Net can be defeated by changing 3 packet opcodes and then correcting them in the client by changing the addresses on the packet handler table rather than immidiately post-decryption? If L2Sublimity's opcode scrambling function acted on the handler table instead then your current dll still wouldn't allow walker to work as it wouldn't be able to determine which packet is which and would just /fail all over itself.

 

 

These protections are crap, pieces of shit made by kids who have no idea what they are doing. All of this stupid -beep-ing dll systems that are all bypassable with even the smallest amount of reverse engineering knowledge. When someone makes a ring-0 driver protection system with self-defense THEN you may call it a masterpiece.

 

 

You Know what RIJNAEL encryption algorithm is???

That is the algorithm Kasha uses to encrypt packets...

It is contained in L2.dll that provides with his client...

Copy paste asm codes you know that doesn't works what do you think when i said adding codes...you think about copy and paste??

I have partially unpacked Kasha modules but if you think it is easy to unpack enigma protector do it..

My main target is to find and bypass the fuction that asks if L2walker presents...you ll never understand..i made the same with sublimity

I never said about injecting l2walker while program is running...

The only fuction that those antibot have is to close applications when they are found attached on l2client or running stand alone...The packet encryption and all this shit i know that have nothing to do with l2walker or anything else...

I just want to make a client with kashas files but with less functions that kasha made it...

Files that original antibot client uses like kashas are necessary to connect to their server...so it is necessary add some of them to the new client

For Sublimity server necessary file was comclt32.dll wich is responsible for killing l2walker

Posted

 

You Know what RIJNAEL encryption algorithm is???

That is the algorithm Kasha uses to encrypt packets...

It is contained in L2.dll that provides with his client...

Copy paste asm codes you know that doesn't works what do you think when i said adding codes...you think about copy and paste??

I have partially unpacked Kasha modules but if you think it is easy to unpack enigma protector do it..

My main target is to find and bypass the fuction that asks if L2walker presents...you ll never understand..i made the same with sublimity

I never said about injecting l2walker while program is running...

The only fuction that those antibot have is to close applications when they are found attached on l2client or running stand alone...The packet encryption and all this shit i know that have nothing to do with l2walker or anything else...

I just want to make a client with kashas files but with less functions that kasha made it...

Files that original antibot client uses like kashas are necessary to connect to their server...so it is necessary add some of them to the new client

For Sublimity server necessary file was comclt32.dll wich is responsible for killing l2walker

So the fact he uses AES makes it a masterpiece? Seriously?

 

AES is only a secure encryption to an outsider, not someone who has access to the public key which will be inside kasha's protection module and even IF he uses a polymorphic key you can still find the original public key when it is first sent to the client by hooking his AES initialization function...

 

I can see you are obviously new to reverse engineering otherwise you would know that unpacking the dll isn't necessary as the code in run-time is available unencrypted in the memory, unless with extremely complex encryption systems that use virtualization or self-debugging and exception code-replacement methods - which as far as i can tell enigma has neither.

Posted

So the fact he uses AES makes it a masterpiece? Seriously?

 

AES is only a secure encryption to an outsider, not someone who has access to the public key which will be inside kasha's protection module and even IF he uses a polymorphic key you can still find the original public key when it is first sent to the client by hooking his AES initialization function...

 

I can see you are obviously new to reverse engineering otherwise you would know that unpacking the dll isn't necessary as the code in run-time is available unencrypted in the memory, unless with extremely complex encryption systems that use virtualization or self-debugging and exception code-replacement methods - which as far as i can tell enigma has neither.

Enigma contains all of those methods to prevent unpack throught a dumped memory section...

If it is so easy to you then why don't you make a working IG walker for a server that uses Kasha protection??

Let's say about DEX server

Posted

Enigma contains all of those methods to prevent unpack throught a dumped memory section...

If it is so easy to you then why don't you make a working IG walker for a server that uses Kasha protection??

Let's say about DEX server

Read what I said, I didn't say anything about unpacking it, attach a debugger to the running l2 process and BOOM you got all the code in-memory with no encryption.

I'll look into dex but I doubt I'll bother wasting my time on it just to prove someone like you wrong, I do have better things to do with my time you know.

Posted

Read what I said, I didn't say anything about unpacking it, attach a debugger to the running l2 process and BOOM you got all the code in-memory with no encryption.

I'll look into dex but I doubt I'll bother wasting my time on it just to prove someone like you wrong, I do have better things to do with my time you know.

Use ollydbg ICE...load phant0m plugin for stealth and start debug...try it and you will understand

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.




  • Posts

    • Get in touch via Discord, I created the autofarm you are looking for.   discord: admkelly
    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy               Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello everyone, I'm facing exactly the same issue mentioned in this topic. I've correctly implemented several new mounts in my Lineage 2 Interlude server, but whenever I use the ride/mount action, the client always displays the default strider animation (lineagemonster.strider_m00), even though in my npcgrp.dat everything is correctly referenced to my custom ride.u files (e.g., ride.wolfhound_m00).   90102 Rider.wing_hound_vehicle Riders.wing_hound_vehicle_m00 2 RidersTex.wing_hound_t00 RidersTex.wing_hound_t01 0 1 0 1.00000000 0 1 4 ItemSound.armor_metal_weak_1 ItemSound.armor_leather_3 ItemSound.armor_metal_weak_3 ItemSound.armor_metal_weak_5 3 MonSound12.w_hound_dmg_1 MonSound12.w_hound_dmg_2 MonSound12.w_hound_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41000 Rider.gray_horse Riders.gray_horse_m00 3 RidersTex.gray_horse.gray_horse_t00 RidersTex.gray_horse.gray_horse_t01 RidersTex.gray_horse.gray_horse_t02 0 1 0 1.05882394 0 1 4 MonSound.Hit_Shell_1 MonSound.Hit_normal_3 MonSound.Hit_Wood_3 MonSound.Hit_normal_12 3 MonSound.unicorn_b_dmg_1 MonSound.unicorn_b_dmg_2 MonSound.unicorn_b_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41001 Rider.tawny_maned_lion Riders.tawny_maned_lion_m00 3 RidersTex.tawny_maned_lion.tawny_maned_lion_t00 RidersTex.tawny_maned_lion.tawny_maned_lion_t01 RidersTex.tawny_maned_lion.tawny_maned_lion_t02 0 1 0 1.50000000 0 1 5 MonSound.Hit_normal_12 MonSound.Hit_Normal_1 MonSound.Hit_Shell_3 MonSound.Hit_Shell_4 MonSound.Hit_Wet_4 3 MonSound.strider_dmg_1 MonSound.strider_dmg_2 MonSound.strider_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41002 Rider.steam_sledge Riders.steam_sledge_m00 4 RidersTex.steam_sledge.steam_sledge_t00 RidersTex.steam_sledge.steam_sledge_t01 RidersTex.steam_sledge.steam_sledge_t02 RidersTex.steam_sledge.steam_sledge_t03 0 1 0 1.50000000 0 1 5 ItemSound.armor_metal_weak_3 ItemSound.armor_metal_weak_5 ItemSound.armor_metal_weak_10 ItemSound.armor_metal_alt_1 ItemSound.armor_metal_alt_6 3 MonSound.iron_golem_breathe MonSound.iron_golem_dmg_2 MonSound.iron_golem_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41003 Rider.br_z_bike Riders.br_z_bike_m00 1 RidersTex.npc.br_z_bike_t00 0 1 0 1.00000000 0 1 5 MonSound.Hit_wood_1 MonSound.Hit_Wood_2 MonSound.Hit_Wood_3 MonSound.Hit_Wood_4 MonSound.Hit_Wood_5 0 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41004 Rider.br_g_ant_princess Riders.g_ant_princess_m00 3 RidersTex.Npc.g_ant_princess_t00 RidersTex.Npc.g_ant_princess_t01 RidersTex.Npc.g_ant_princess_t02 0 1 0 1.39999998 0 1 4 MonSound.Hit_Normal_10 MonSound.Hit_Shell_2 MonSound.Hit_Wet_5 ItemSound.shield_bone_1 3 MonSound.queen_ant_dmg_1 MonSound.queen_ant_dmg_2 MonSound.queen_ant_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41005 Rider.br_g_black_bear Riders.g_black_bear 2 RidersTex.Npc.g_black_bear_t00 RidersTex.Npc.g_black_bear_t01 0 1 0 1.39999998 0 1 4 MonSound.Hit_Normal_11 MonSound.Hit_Normal_13 MonSound.Hit_Wet_5 ItemSound.shield_bone_3 3 MonSound11.Kerberos_dmg01 MonSound11.Kerberos_dmg02 MonSound11.Kerberos_dmg03 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41006 Rider.br_g_halloween_flying_broom Riders.g_halloween_flying_broom_m00 1 RidersTex.Npc.g_halloween_flying_broom 0 1 0 1.39999998 0 1 5 MonSound.Hit_wood_1 MonSound.Hit_Wood_2 MonSound.Hit_Wood_3 MonSound.Hit_Wood_4 MonSound.Hit_Wood_5 0 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41007 Rider.illusion_vehicle Riders.illusion_vehicle_m00 2 RidersTex.bird_vehicle.bird_vehicle_t00 RidersTex.bird_vehicle.bird_vehicle_t01 0 1 0 1.05882394 0 1 4 MonSound.Hit_normal_3 MonSound.Hit_Wet_1 MonSound.Hit_Bone_2 MonSound.Hit_normal_12 0 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41008 Rider.vehicle_lindvior Riders.vehicle_lindvior_m00 2 RidersTex.Vehicle_Lindvior.Vehicle_Lindvior_t00 RidersTex.Vehicle_Lindvior.Vehicle_Lindvior_t01 0 1 0 1.05882394 0 1 4 MonSound.Hit_Normal_1 MonSound.Hit_Wet_3 MonSound.Hit_Bone_8 MonSound.Hit_Wet_5 3 MonSound3.dragon_mage_dmg_1 MonSound3.dragon_mage_dmg_2 MonSound3.dragon_mage_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41009 Rider.craft_vehicle_dwarf Riders.craft_vehicle_dwarf_m00 2 RidersTex.craft_vehicle_dwarf.craft_vehicle_dwarf_t00 RidersTex.craft_vehicle_dwarf.craft_vehicle_dwarf_t01 0 1 0 1.05882394 0 1 4 MonSound.Hit_Normal_1 MonSound.Hit_Wood_2 MonSound.Hit_Wood_3 MonSound.Hit_Normal_7 0 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41010 Rider.eligor_vehicle Riders.eligor_vehicle_m00 2 RidersTex.eligor_vehicle.eligor_vehicle_t00 RidersTex.eligor_vehicle.eligor_vehicle_t01 0 1 0 1.00000000 0 1 4 MonSound.Hit_normal_3 MonSound.Hit_Wet_1 MonSound.Hit_Bone_2 MonSound.Hit_normal_12 3 MonSound16.kanilof_dmg_1 MonSound16.kanilof_dmg_2 MonSound16.kanilof_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41011 Rider.elder_pegasus_vehicle Riders.elder_pegasus_vehicle_m00 2 RidersTex.elder_pegasus_vehicle.elder_pegasus_event_vehicle_t00 RidersTex.elder_pegasus_vehicle.elder_pegasus_event_vehicle_t01 0 1 0 1.00000000 0 1 5 MonSound.Hit_Normal_1 MonSound.Hit_Normal_6 MonSound.Hit_Normal_7 MonSound.Hit_Normal_8 MonSound.Hit_normal_12 3 MonSound12.cobalt_horse_dmg_1 MonSound12.cobalt_horse_dmg_2 MonSound12.cobalt_horse_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41012 Rider.wing_hound_vehicle Riders.wing_hound_vehicle_m00 2 RidersTex.wing_hound_t00 RidersTex.wing_hound_t01 0 1 0 1.00000000 0 1 4 ItemSound.armor_metal_weak_1 ItemSound.armor_leather_3 ItemSound.armor_metal_weak_3 ItemSound.armor_metal_weak_5 3 MonSound12.w_hound_dmg_1 MonSound12.w_hound_dmg_2 MonSound12.w_hound_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 41013 Rider.sp_griffin_vehicle Riders.sp_griffin_vehicle_m00 3 RidersTex.griffin_vehicle.griffin_vehicle_t00 RidersTex.griffin_vehicle.griffin_vehicle_t01 RidersTex.griffin_vehicle.griffin_vehicle_t02 0 1 0 1.00000000 0 1 5 MonSound.Hit_Normal_1 MonSound.Hit_Normal_6 MonSound.Hit_Normal_7 MonSound.Hit_Normal_8 MonSound.Hit_normal_12 3 MonSound23.sp_griffin_dmg_1 MonSound23.sp_griffin_dmg_2 MonSound23.sp_griffin_dmg_3 0 1 0 LineageEffect.p_u002_a 0 50.00000000 250.00000000 70.00000000 0 1 I've examined the server-side code and realized the problem likely comes from the client only looking at the _rideType (which is 1 for STRIDER) and ignoring the _rideNpcId when determining which animation to load. @Banshee Garnet mentioned an "extended dll" - does this involve modifying the L2.dll or L2Client.dll so it checks the NpcId in addition to the rideType? Has anyone already made this modification and could share more details on how to proceed? Looking at l2royale.com, I can see they indeed have multiple functional mounts in their Interlude client. I'd like to understand which approach they used: Is it indeed a DLL modification? Which specific parts of the DLL need to be modified? Are there already patches or tools that allow adding this functionality? If anyone has successfully implemented multiple mounts in Interlude or knows the precise technical solution, I would be very grateful for any information or help. Thanks in advance!
  • Topics

×
×
  • Create New...