• Welcome to Valhalla Legends Archive.
 

Warden anti-hack is back..

Started by brew, August 29, 2007, 07:01 PM

Previous topic - Next topic
|

Barabajagal

No... I just looked up RC4 a few days ago for some reason....

Joe[x86]

No.. yeah, WoW's protocol is encrypted by RC4, and Warden is also in WoW.
Quote from: brew on April 25, 2007, 07:33 PM
that made me feel like a total idiot. this entire thing was useless.

Barabajagal

I wasn't looking up WoW or warden though -.-

brew

Diablo II Warden requests...
And what do you mean, "why does blizzard use so many different kinds of encryption"?
The only encryption i've seen blizzard so far is RC4.
<3 Zorm
Quote[01:08:05 AM] <@Zorm> haha, me get pussy? don't kid yourself quik
Scio te esse, sed quid sumne? :P

iCe

Quote from: brew on September 11, 2007, 02:17 PM
Diablo II Warden requests...
And what do you mean, "why does blizzard use so many different kinds of encryption"?
The only encryption i've seen blizzard so far is RC4.

Forgot about the login packets?

iago

Quote from: iCe on September 11, 2007, 02:42 PM
Quote from: brew on September 11, 2007, 02:17 PM
Diablo II Warden requests...
And what do you mean, "why does blizzard use so many different kinds of encryption"?
The only encryption i've seen blizzard so far is RC4.

Forgot about the login packets?

Login packets aren't encrypted. On traditional clients, your password is "hashed" (not encrypted), and on newer clients a verifier related to your password is generated, in a way that's similar to encryption.
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


Barabajagal

A hash is a one way encryption.

iago

If you can't recover the original, it's not encryption, it's hashing. Encryption, by definition, is two-way.
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


Barabajagal

The definition of a hash I've always heard is a "one-way encryption", as a hash's full name is a "cryptographic hash function".

devcode

The tedious part is to find out how the key is obtained in order to generate the S[box] array in ARC4. I think Ringo was attempting this previously, I wonder how that went.

Don Cullen

Quote from: devcode on September 11, 2007, 04:36 PM
The tedious part is to find out how the key is obtained in order to generate the S[box] array in ARC4. I think Ringo was attempting this previously, I wonder how that went.

I don't know if this would be of assistance, but RC4 has already been reversed.

http://www.di.unito.it/~rabser/ssleay/rrc4.html

On brute forcing RC4 keys:
http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/9316/29617/01344747.pdf?arnumber=1344747

On discovering the key if it's a weak key:
http://www.cs.berkeley.edu/~daw/my-posts/my-rc4-weak-keys

Good luck, dude.
Regards,
Don
-------

Don't wonder why people suddenly are hostile when you treat them the way they shouldn't be- it's called 'Mutual Respect'.

devcode

Not really what I meant but thanks, I think I have found where it's generating the key stream.

Quote from: Don Cullen on September 11, 2007, 04:58 PM
Quote from: devcode on September 11, 2007, 04:36 PM
The tedious part is to find out how the key is obtained in order to generate the S[box] array in ARC4. I think Ringo was attempting this previously, I wonder how that went.

I don't know if this would be of assistance, but RC4 has already been reversed.

http://www.di.unito.it/~rabser/ssleay/rrc4.html

On brute forcing RC4 keys:
http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/9316/29617/01344747.pdf?arnumber=1344747

On discovering the key if it's a weak key:
http://www.cs.berkeley.edu/~daw/my-posts/my-rc4-weak-keys

Good luck, dude.

|