Valhalla Legends Archive

Programming => General Programming => Topic started by: Mephisto on December 12, 2004, 05:49 PM

Title: Creating Authentication Systems
Post by: Mephisto on December 12, 2004, 05:49 PM
What are some good ways to create authentication systems for applications you want to keep private but are at risk of being leaked by other people?
Title: Re: Creating Authentication Systems
Post by: Banana fanna fo fanna on December 12, 2004, 07:11 PM
In short: there aren't any.
Title: Re: Creating Authentication Systems
Post by: Mephisto on December 12, 2004, 07:27 PM
Omit the "good" then.

I have an idea that I haven't fully thought through, but it invovles taking a value which is unique for each user, but never changes and have that value sent to a Website which will encrypt it and come up with some sort of "key."  The user takes that key and puts it into a file, and the application decrypts the key and checks it against their unique value that never changes, and if it passes, the application proceeds.
Title: Re: Creating Authentication Systems
Post by: hismajesty on December 12, 2004, 07:52 PM
Base it on harddrive serial.
Title: Re: Creating Authentication Systems
Post by: Eibro on December 12, 2004, 09:41 PM
Quote from: Banana fanna fo fanna on December 12, 2004, 07:11 PM
In short: there aren't any.
That is a horrible answer.

QuoteBase it on harddrive serial.
Base what on hard drive serial?


"Good" is a relative term. No matter how great your protection scheme is, it can always be broken. You want to find some middle ground-- there isn't much point in spending a lot of time on a elaborate scheme if no one has any reason to want to break it. If there is a reason for someone to want to break it, you need to implement something which will require a significant amount of time/skill to defeat. You can create protection which will defeat the average user. You can create protection which will defeat an amateur hacker. You can create protection which will defeat an experienced hacker. However, will there be such a demand for your application that an experienced hacker will ever take a look at it?
Title: Re: Creating Authentication Systems
Post by: Mephisto on December 12, 2004, 10:44 PM
The protection need not warrant an experienced hacker, but it needs to be sufficient enough to prevent people from just using the application without permission granted, and made to where they can't just get a key without actually doing some hacking, and that hacking they do do shouldn't be as easy as 123 to get break the protection, but it doesn't need to be extensive protection as I said.
Title: Re: Creating Authentication Systems
Post by: hismajesty on December 13, 2004, 05:46 AM
QuoteBase what on hard drive serial?

Use the persons harddrive serial number for authorization. Or maybe generate a key based on their serial number.

Rabbit did his authorization using a haddrive serial number, I don't remember the exact method though.

QuoteThe protection need not warrant an experienced hacker

It doesn't take much experience to map the address where your auth file is stored to a point to a different one, or nop out a few lines after disassembling it. However, as Eibro said, would anybody care?
Title: Re: Creating Authentication Systems
Post by: iago on December 13, 2004, 08:27 AM
Doing it based on harddrive serial is useless, because they can just bypass that part of the code. 

The best way is just to make your software opensource, and release the entire thing publicly, encouraging others to work on it, and provide patches if they find a bug.  It works surprisingly well.  Think about the REASON you want it to be closed.  The only one I can think of is so that people who don't have it say, "I want it! I'm going to be friends with the person who wrote it so that he'll give ME a copy!" and anybody who does it for that reason is pathetic.

Look at Skywing's BinaryChat: it had amazing protection on it, since we all know that Skywing is totally elite, and somebody has broken it.  There isn't a lot you can do to prevent a serious hacker from getting at your code, short of not giving it to them.  And even that doesn't always work (see also: half life 2).
Title: Re: Creating Authentication Systems
Post by: Kp on December 13, 2004, 10:30 AM
Quote from: iago on December 13, 2004, 08:27 AMThink about the REASON you want it to be closed.  The only one I can think of is so that people who don't have it say, "I want it! I'm going to be friends with the person who wrote it so that he'll give ME a copy!" and anybody who does it for that reason is pathetic.

There's also the reasoning that it's simply too dangerous for public consumption.  Consider what a mess it would wreak on BW public gaming if the sum total of SCRL (Adron's SC HDL), SCE (Sky/Grok's SC HDL), and my BW work were merged into an open source project and released.  Obviously a special case, but it is another reason against release. :)
Title: Re: Creating Authentication Systems
Post by: iago on December 13, 2004, 11:26 AM
Quote from: Kp on December 13, 2004, 10:30 AM
Quote from: iago on December 13, 2004, 08:27 AMThink about the REASON you want it to be closed.  The only one I can think of is so that people who don't have it say, "I want it! I'm going to be friends with the person who wrote it so that he'll give ME a copy!" and anybody who does it for that reason is pathetic.

There's also the reasoning that it's simply too dangerous for public consumption.  Consider what a mess it would wreak on BW public gaming if the sum total of SCRL (Adron's SC HDL), SCE (Sky/Grok's SC HDL), and my BW work were merged into an open source project and released.  Obviously a special case, but it is another reason against release. :)

Indeed, I should have mentioned that.  The only thing that I've made that I haven't released with source is my Starcraft/Diablo hacks.  I completely agree, some things are destructive.  But in general, my statements stand :P

On a sidenote, to be technical, there is a lot of code that I've never made public for the sole reaason that I don't think anybody would care.  Of course, if somebody asked me for it (for example, my Java Huffman implementation), I'd happily give it to them.
Title: Re: Creating Authentication Systems
Post by: hismajesty on December 13, 2004, 01:48 PM
Quote from: iago on December 13, 2004, 08:27 AM
Doing it based on harddrive serial is useless, because they can just bypass that part of the code.

That applies to a lot of current methods. Think of those games that we cracked when you were teaching me to read Assembly.

QuoteThe best way is just to make your software opensource, and release the entire thing publicly, encouraging others to work on it, and provide patches if they find a bug. It works surprisingly well.

Despite his reason, making it open source/freely available kinda defeats the point which is to keep it private...
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 13, 2004, 01:55 PM
Quote from: iago on December 13, 2004, 08:27 AM
Look at Skywing's BinaryChat: it had amazing protection on it, since we all know that Skywing is totally elite, and somebody has broken it.

You forgot ZeroBot (binary version)! *;)* (http://www.userloser.net/images/zerobotcracked.png)  But I'm pretty sure Sky doesn't use that same method anymore
Title: Re: Creating Authentication Systems
Post by: iago on December 13, 2004, 04:02 PM
Quote from: hismajesty[yL] on December 13, 2004, 01:48 PM
Quote from: iago on December 13, 2004, 08:27 AM
Doing it based on harddrive serial is useless, because they can just bypass that part of the code.

That applies to a lot of current methods. Think of those games that we cracked when you were teaching me to read Assembly.
I know, you can bypass ANY protection.  There's nothing at all that you can do to stop it, just slow it down.

Quote
QuoteThe best way is just to make your software opensource, and release the entire thing publicly, encouraging others to work on it, and provide patches if they find a bug. It works surprisingly well.

Despite his reason, making it open source/freely available kinda defeats the point which is to keep it private...
My point is that keeping stuff private is stupid.
Title: Re: Creating Authentication Systems
Post by: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method.  If someone has a public one and wishes to share, please do so.
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 13, 2004, 07:02 PM
Quote from: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method.  If someone has a public one and wishes to share, please do so.

Strong encryption based off of certain values returned from querying the user's system info
Title: Re: Creating Authentication Systems
Post by: hismajesty on December 13, 2004, 07:18 PM
Quote from: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method. If someone has a public one and wishes to share, please do so.

I gave you a method.
Title: Re: Creating Authentication Systems
Post by: Eibro on December 13, 2004, 07:20 PM
Quote from: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method.  If someone has a public one and wishes to share, please do so.
What have you come up with so far?
Title: Re: Creating Authentication Systems
Post by: Mephisto on December 13, 2004, 07:26 PM
I explained it in an earlier post; HisMajesty, you gave me an idea to base it off of, not really a method of doing it.  :)
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21

Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm

Nobody has cracked it yet. :)
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 13, 2004, 07:48 PM
Quote from: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21

Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm

Nobody has cracked it yet. :)

Send the app to [email protected]
Title: Re: Creating Authentication Systems
Post by: Arta on December 13, 2004, 08:07 PM
or [email protected], if I have time :P
Title: Re: Creating Authentication Systems
Post by: Kp on December 13, 2004, 08:11 PM
Or post it somewhere and I'll take a crack at it.  I have some downtime coming up.
Title: Re: Creating Authentication Systems
Post by: Mephisto on December 13, 2004, 08:27 PM
Isn't it fairly easy to crack applications that use a harddrive serial number?
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 13, 2004, 08:28 PM
Quote from: Mephisto on December 13, 2004, 08:27 PM
Isn't it fairly easy to crack applications that use a harddrive serial number?

Fairly easy to crack anything that's non-encrypted

Quote from: Kp on December 13, 2004, 08:11 PM
Or post it somewhere and I'll take a crack at it.  I have some downtime coming up.

Hmm, inproc is where now? :p
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 13, 2004, 10:09 PM
Quote from: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21

Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm

Nobody has cracked it yet. :)

"ZakenNayo"?

[22:05:45.734] [AUTH] Decoding authorization key...
[22:05:45.734] [AUTH] Authorization key validated
[22:05:45.750] [AUTH] Verifying authorization database....
[22:05:45.750] [AUTH] Authorization database verified
[22:05:45.750] [AUTH] Sending authorization request...
[22:05:45.968] [AUTH] Authorization passed
[22:05:48.609]  -- Error: Enter CD-Key
[22:05:48.609]  -- Error: Enter home channel
[22:05:48.609]  -- Error: Enter password
[22:05:48.609]  -- Error: Enter username

/shrug

Swapped a few jz and jnz's~
Title: Re: Creating Authentication Systems
Post by: Falcon[anti-yL] on December 13, 2004, 10:18 PM
haha  ;D
Title: Re: Creating Authentication Systems
Post by: dxoigmn on December 13, 2004, 10:36 PM
You could create something like bnls with authentication and encrypt the stream using RSA.  If this has nothing to do with a bot, then you could do the same thing but  with the critical functions server-side.
Title: Re: Creating Authentication Systems
Post by: iago on December 14, 2004, 09:48 AM
Storing critical functions on a server will slow you down.  In fact, why don't you store the entire program online? Just make the bot a series of encrypted calls to the server?

What is stopping somebody from breaking the authentication, and using your server for themselves, though?  If you are using an encrypted stream, the client still has the ability to decrypt and use it, so that decryption code can be taken.
Title: Re: Creating Authentication Systems
Post by: Kp on December 14, 2004, 10:46 AM
Quote from: iago on December 14, 2004, 09:48 AMStoring critical functions on a server will slow you down.  In fact, why don't you store the entire program online? Just make the bot a series of encrypted calls to the server?

What is stopping somebody from breaking the authentication, and using your server for themselves, though?  If you are using an encrypted stream, the client still has the ability to decrypt and use it, so that decryption code can be taken.

Ah, but if each client has its own unique authentication to the server, you can revoke individual clients when you realize what they're doing (similar to how CDkeys can be revoked from battle.net if they're caught causing too much trouble).  Incidentally, I agree with your implication that this is taking it to an extreme.
Title: Re: Creating Authentication Systems
Post by: dxoigmn on December 14, 2004, 12:49 PM
Quote from: iago on December 14, 2004, 09:48 AM
Storing critical functions on a server will slow you down.  In fact, why don't you store the entire program online? Just make the bot a series of encrypted calls to the server?

Depends on the application I suppose.  But is a worthwhile and difficult measure to get past without alerting the creator someone is trying to break their application.  This thread reminds of what when MousePad and the Javascript dude (forgot is name, he attached a javascript engine to D2) had this neeto encryption that they thought couldn't be broken and eventually it did.
Title: Re: Creating Authentication Systems
Post by: iago on December 14, 2004, 01:15 PM
The program has to necessarely decrypt itself to run, so there has to be a way to get around it. 

Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 14, 2004, 07:16 PM
Quote from: UserLoser on December 13, 2004, 10:09 PM
Quote from: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21

Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm

Nobody has cracked it yet. :)

"ZakenNayo"?

[22:05:45.734] [AUTH] Decoding authorization key...
[22:05:45.734] [AUTH] Authorization key validated
[22:05:45.750] [AUTH] Verifying authorization database....
[22:05:45.750] [AUTH] Authorization database verified
[22:05:45.750] [AUTH] Sending authorization request...
[22:05:45.968] [AUTH] Authorization passed
[22:05:48.609]  -- Error: Enter CD-Key
[22:05:48.609]  -- Error: Enter home channel
[22:05:48.609]  -- Error: Enter password
[22:05:48.609]  -- Error: Enter username

/shrug

Swapped a few jz and jnz's~
No, that has a crappy auth system.  FoFoBot, which I sadly lost due to harddrive reformat, had the serial encryption.
http://cold-chaos.net/rabbit/FF_Full.exe or http://cold-chaos.net/rabbit/FF_Lite.exe are the installers for the old FoFoBot.

PS: ZakenNayo is public now, so there's no point to even cracking the serial.
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 14, 2004, 07:54 PM
 [19:52:51] [AUTH] Failed (1): Serial not found.  Request serial number with /reqser
[19:52:56] [AUTH] Passed (0): Serial request sent.  Please wait for activation.
[19:53:36] [AUTH] Passed (1): Serial accepted.
[19:53:37] [AUTH] Passed (2): Your serial was accepted.
[19:53:37] BNET: Connecting...
[19:53:37] BNET: 10049: Address is not available from the local machine.
[19:53:37] BNET: Disconnected.
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 14, 2004, 08:31 PM
Ah..I turned off the auth system, which I just turned on again.  Try now :)

[edit]
I also made this (http://www.rabbitsoftware.net/CrackMe.zip).  It's based off of a new serial system I am making, it'd be nice to see if any of you can crack it.

[edit2]
Fixed.
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 14, 2004, 08:57 PM
Quote from: R.a.B.B.i.T on December 14, 2004, 08:31 PM
Ah..I turned off the auth system, which I just turned on again.  Try now :)

[edit]
I also made this (http://www.rabbitsoftware.net/CrackMe.zip).  It's based off of a new serial system I am making, it'd be nice to see if any of you can crack it.


Broken link.
Title: Re: Creating Authentication Systems
Post by: iago on December 14, 2004, 10:05 PM
Quote from: UserLoser on December 14, 2004, 08:57 PM
Quote from: R.a.B.B.i.T on December 14, 2004, 08:31 PM
Ah..I turned off the auth system, which I just turned on again.  Try now :)

[edit]
I also made this (http://www.rabbitsoftware.net/CrackMe.zip).  It's based off of a new serial system I am making, it'd be nice to see if any of you can crack it.


Broken link.

Looks ok here.
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 14, 2004, 10:30 PM
What happens when you crack it?  Does it append a ":)" to the end of the first textbox? How do we know when it's cracked?
Title: Re: Creating Authentication Systems
Post by: Arta on December 15, 2004, 09:43 AM
As UserLoser points out, we lack some information here, but I think this is probably it:

(http://www.valhallalegends.com/arta/CrackMe.jpg)
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.
Title: Re: Creating Authentication Systems
Post by: iago on December 15, 2004, 04:18 PM
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.

Why? You have to watch out for both.  The best way is to encrypt a series of commands, and the only way to decrypt them is with a valid key.  That why, they can't change a jump.
Title: Re: Creating Authentication Systems
Post by: Arta on December 15, 2004, 04:21 PM
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.

Why would anyone go to that kind of trouble?
Title: Re: Creating Authentication Systems
Post by: Adron on December 15, 2004, 04:32 PM
Quote from: Arta[vL] on December 15, 2004, 04:21 PM
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.

Why would anyone go to that kind of trouble?

I like doing that because it typically lets me install future upgrades of the program without any additional work....
Title: Re: Creating Authentication Systems
Post by: iago on December 15, 2004, 05:25 PM
Quote from: Adron on December 15, 2004, 04:32 PM
Quote from: Arta[vL] on December 15, 2004, 04:21 PM
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.

Why would anyone go to that kind of trouble?

I like doing that because it typically lets me install future upgrades of the program without any additional work....

By fingerprinting the code, you can usually do that anyway, unless they make changes to the algorithm.  And if they change the algorithm, your keygen won't work either.
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked.  I think I should start changing my aglorithims each release now -.-
Title: Re: Creating Authentication Systems
Post by: Arta on December 16, 2004, 04:51 PM
Won't make any difference :)
Title: Re: Creating Authentication Systems
Post by: MyndFyre on December 16, 2004, 05:04 PM
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked.  I think I should start changing my aglorithims each release now -.-

It wouldn't make a difference if the hacker figured out how to bypass the algo altogether.
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 16, 2004, 05:06 PM
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked.  I think I should start changing my aglorithims each release now -.-

Should look into your own encryption/scrambling system if you want it to be more secure.  By secure, I mean take more effort to crack; rather than modifying about 3 bytes of your code in the executable
Title: Re: Creating Authentication Systems
Post by: iago on December 16, 2004, 05:31 PM
Is it possible to do encryptions like that for VB programs?  I'm assuming that RaBBiT is using VB, and I know VB is really limited (much like Java) for low level stuff like that.
Title: Re: Creating Authentication Systems
Post by: MyndFyre on December 16, 2004, 05:33 PM
Quote from: iago on December 16, 2004, 05:31 PM
Is it possible to do encryptions like that for VB programs?  I'm assuming that RaBBiT is using VB, and I know VB is really limited (much like Java) for low level stuff like that.

You could do a simple encryption with a stub program, I imagine: encrypt the entire program by doing something simple like XORing each byte with an arbitrary byte such as 0x6f or something.  Then prepend a stub that loads the data, decrypts it, and jumps to where the actual entry point *should* be.
Title: Re: Creating Authentication Systems
Post by: Eibro on December 16, 2004, 06:28 PM
Quote from: MyndFyre on December 16, 2004, 05:33 PM
Quote from: iago on December 16, 2004, 05:31 PM
Is it possible to do encryptions like that for VB programs?  I'm assuming that RaBBiT is using VB, and I know VB is really limited (much like Java) for low level stuff like that.

You could do a simple encryption with a stub program, I imagine: encrypt the entire program by doing something simple like XORing each byte with an arbitrary byte such as 0x6f or something.  Then prepend a stub that loads the data, decrypts it, and jumps to where the actual entry point *should* be.
A system like that is equally as weak. I could just convert the descrambling code into an IDC script and run it on scrambled sections.
Title: Re: Creating Authentication Systems
Post by: MyndFyre on December 16, 2004, 06:32 PM
Quote from: Eibro[yL] on December 16, 2004, 06:28 PM
A system like that is equally as weak. I could just convert the descrambling code into an IDC script and run it on scrambled sections.

Yes I know.  That's why I said "You could do a simple encryption."  The point was that it would be possible, not the strength of the scheme of protection.
Title: Re: Creating Authentication Systems
Post by: Banana fanna fo fanna on December 16, 2004, 07:24 PM
Should encrypt the exe on disk, and use code modification in-memory to randomly scramble around program flow.
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 19, 2004, 09:56 PM
Quote from: MyndFyre on December 16, 2004, 05:04 PM
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked.  I think I should start changing my aglorithims each release now -.-

It wouldn't make a difference if the hacker figured out how to bypass the algo altogether.
It would change the place where the jump occured, however!
Title: Re: Creating Authentication Systems
Post by: UserLoser. on December 19, 2004, 10:14 PM
Quote from: R.a.B.B.i.T on December 19, 2004, 09:56 PM
Quote from: MyndFyre on December 16, 2004, 05:04 PM
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked.  I think I should start changing my aglorithims each release now -.-

It wouldn't make a difference if the hacker figured out how to bypass the algo altogether.
It would change the place where the jump occured, however!

So?  Then all someone has to do is disassemble it or do what they did the first time to find it
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 20, 2004, 06:04 PM
True, but it does get annoying to decompile and change the program every time.  Cracking the serial would work until the algorithm would change.
Title: Re: Creating Authentication Systems
Post by: Banana fanna fo fanna on December 20, 2004, 06:06 PM
it would take prolly 5 min to crack that protection.
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on December 20, 2004, 08:21 PM
I never said it was the best, or even GOOD.  It was just an example.
Title: Re: Creating Authentication Systems
Post by: TheMinistered on January 08, 2005, 10:46 AM
Yes, it is possible-- although quite ugly!  The key to doing it is a v-table hack & signatures.  We use the v-table hack so that we can write our scramble/descramble encrypt/decrypt in assembly.  Then the assembly needs signatures, since we can't do inline assembly we give the scramble/descramble encrypt/decrypt a dummy parameter and we pass something obvious like 0x12345678 or 0xBADBEEF, something our routines can scan for to know where to stop at.  It also requires a bit more for signatures using this method because the signatures will be pushed onto the stack before the call, etc.


Dim m_objProtection as new clsProtection

Private Sub Form_Load()
    Set m_objProtection = new clsProtection
End Sub

Private Sub DoMath()
  Dim lngX as long, lngY as long   

    Call m_objProtection.Decramble(&H12345678)
        lngX = 1
        lngY = 1
        lngX = lngX + lngY
    Call m_objProtection.Scramble(&H87654321)
End Sub

Private Sub Form_Unload(ByRef Cancel as Integer)
    Set m_objProtection = Nothing
End Sub

Title: Re: Creating Authentication Systems
Post by: Arta on January 09, 2005, 02:04 AM
Nice to see you got that working in the end :)
Title: Re: Creating Authentication Systems
Post by: Newby on January 09, 2005, 11:48 AM
Nice to see I didn't have to write the scrambling part after all. :)
Title: Re: Creating Authentication Systems
Post by: Joe[x86] on January 28, 2005, 05:46 PM
Four things. EDIT: Five.

iago:
QuoteI completely agree, some things are destructive.
My point is that keeping stuff private is stupid.
I think he forgets pretty fast, if you ask me.

UserLoser:
Quote"ZakenNayo"?
FoFoBot, although RaBBiT already said. ^^

Mephisto: I would have a list of authorized names somewhere and then access that list, and if CrLf, the name, and then CrLf is in the list, then their authorized. I know its easily crackable, but its what Stealth uses, plus checking for the end of his lines. I haven't tried, but from seeing the StealthLock code, you could pass the authorization by using the middle of an authorized name as your name, unless he upgraded it to check for vbCrLf's too.

RaBBiT: I'm guessing your saying "Heres FoFoBot, now crack it. See if I care.", right?

EDIT:
Fifth and finally, page break!
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on January 29, 2005, 05:54 PM
Pretty much, considering I set the auth to a BNLS similar way (before BNLS converted).  If your info works, you get a valid logon response.  If it doesn't or is just completely absent you get the "I don't give a fuck, logon anyways" message.
Title: Re: Creating Authentication Systems
Post by: Adron on January 30, 2005, 03:53 AM
Quote from: rabbit on January 29, 2005, 05:54 PM
Pretty much, considering I set the auth to a BNLS similar way (before BNLS converted).  If your info works, you get a valid logon response.  If it doesn't or is just completely absent you get the "I don't give a fuck, logon anyways" message.

Which means that to "hack" your bot, you'd make an entry in the hosts file?
Title: Re: Creating Authentication Systems
Post by: R.a.B.B.i.T on February 01, 2005, 07:49 AM
And people always tried decompiling.  The simplist method usually works best :)
Title: Re: Creating Authentication Systems
Post by: QwertyMonster on February 04, 2005, 08:32 AM
There is one way, making a seperate bot connect on form_load with the user not knowing, and if you see its somebody you dont know, make it shutdown, and the way you can do that is

Make the bot look at a website with a txtdocument with something like "DOWN", if its there, bot will stay up, if it isnt the bot will shutdown, easy ?
Title: Re: Creating Authentication Systems
Post by: Soul Taker on February 04, 2005, 10:20 AM
Quote from: QwertyMonster on February 04, 2005, 08:32 AM
There is one way, making a seperate bot connect on form_load with the user not knowing, and if you see its somebody you dont know, make it shutdown, and the way you can do that is

Make the bot look at a website with a txtdocument with something like "DOWN", if its there, bot will stay up, if it isnt the bot will shutdown, easy ?
Then all someone has to do is change their hosts file so the bot will use a text document on localhost rather than your website.
Title: Re: Creating Authentication Systems
Post by: UserLoser. on February 04, 2005, 11:52 PM
Hmm, this may be a bad method since it will consume bandwidth and time, but to me it surely sounds safe if you understand what I'm trying to say :)

User gets the executable which is scrambled based off of a unique key decided from program which gets info about the user's computer.  The executable is compiled like normal & server adds this version of executable into it's database, then using another application it scrambles all of the contents except the code which grabs the unique key for the user's system.  The executable contains no decryption, unscrambling, scrambling, or encryption code at all.  The executable is forced to connect to the "auth server" which everything is done.  The executable sends the server the key, and the server unscrambles the defined executable (gets the file contents from the database) based on the key sent, and then the server sends back all of the unscrambled data (valid or not) to the program and it just writes over the useless scrambled junk.  Continue execution of program.

So pretty much there is no way to unscramble any of the code (it's basically just dummy bytes that will get overwritten) unless you connect to the correct server.  The server cannot be rerouted (nobody will know how to write a server which performs the required tasks), modifying hosts file will not help in anyway, so that's good i guess.
Title: Re: Creating Authentication Systems
Post by: Arta on February 05, 2005, 02:14 AM
Write a hook function that intercepts the area of the executable where the decrypted code is received and written to memory. Save the decrypted code along with an offset that defines where it goes. Start replacing encrypted sections with the decrypted data, without removing the decryption mechanism on areas that are still encrypted. Use the program thoroughly. Eventually, all sections should be decrypted.

Alternatively, make a list of all encrypted sections and the encrypted data, write a client for the auth server, request that it decrypt all of them, write them to the .exe, and bingo.
Title: Re: Creating Authentication Systems
Post by: Soul Taker on February 05, 2005, 04:22 AM
If your secure executable is being replaced, UL, wouldn't the original leaker just leak the already descrambled version?
Title: Re: Creating Authentication Systems
Post by: Banana fanna fo fanna on February 05, 2005, 02:28 PM
How about this:

Your app is a device driver. When it smells trouble (debugger etc), it does some whacko hardware error so you can't debug it. Ensure it's always in memory and locked in the filesystem, too.
Title: Re: Creating Authentication Systems
Post by: Soul Taker on February 06, 2005, 07:18 AM
Quote from: Banana fanna fo fanna on February 05, 2005, 02:28 PM
How about this:

Your app is a device driver. When it smells trouble (debugger etc), it does some whacko hardware error so you can't debug it. Ensure it's always in memory and locked in the filesystem, too.
Lots of games do something similar to foil people using virtual drives to play the games.  All of them that I've played have been cracked irregardless though, and most Softice detecting stuff has been foiled too.
Title: Re: Creating Authentication Systems
Post by: QwertyMonster on February 06, 2005, 12:45 PM
Hmm i have another idea.

Ask Stealth How he makes hes bot show its time for update when outdated, but switch it around to see when an invalid user connects (One you dont know) and make it shutdown.

But maybe Stealth will be mean and not tell you, but worth a try? :/
Title: Re: Creating Authentication Systems
Post by: DeTaiLs on February 06, 2005, 01:07 PM
i am pretty sure they already know how to do that if they know winsock and it be pretty easy to bi-pass it all u need to do is put a jump where it checks the website
Title: Re: Creating Authentication Systems
Post by: Stealth on February 06, 2005, 06:20 PM
Quote from: QwertyMonster on February 06, 2005, 12:45 PM
Hmm i have another idea.

Ask Stealth How he makes hes bot show its time for update when outdated, but switch it around to see when an invalid user connects (One you dont know) and make it shutdown.

But maybe Stealth will be mean and not tell you, but worth a try? :/

That system and the beta authorization system have almost no security at all to them. They can be hijacked with a simple hosts-file redirect or a variety of other methods.
Title: Re: Creating Authentication Systems
Post by: Warrior on February 06, 2005, 07:36 PM
The fact that non beta users dont have SB Beta and he only picks honest people is  most likely the reason he wont break his back writing a good Authentication system.
Title: Re: Creating Authentication Systems
Post by: QwertyMonster on February 07, 2005, 11:24 AM
Lol, well an easy Authentication that can be hijacked easy seems to be working good. To me it looked good, until now you told me!  :P
Title: Re: Creating Authentication Systems
Post by: Warrior on February 07, 2005, 12:00 PM
Most Auths can be bypassed by jumping where it comes out incorrect to where it comes out correct by editing a few bytes. But like stated earlier it depends who are the people who use your Bots and if they know how to bypass your Authentication, unless you plan on distributing your product to the masses and have alot of smart enemies I dont think you need to have a super secure Authentication
Title: Re: Creating Authentication Systems
Post by: Mephisto on February 07, 2005, 01:18 PM
Well, as I have learned, generally any authentication which does not use encryption can be easily bypassed (though there are certain things you can do to make it very tedius work for the hacker to bypass your authentication such as having 50 checks made in different ways and in different places; though the user could just figure out your authentication method and bypass all those, but you could make your authentication via a server instead of locally which cancels out that idea).
Title: Re: Creating Authentication Systems
Post by: tA-Kane on February 07, 2005, 04:16 PM
What you people might be missing is that everything needed to make a successful connection to the server is there in the executable. Whether it's just a simple data encryption handshake, or the code necessary to download an alternate program to be stored in memory, all it takes is time before someone will crack it.