Тёмный

MMORPG Bot Reverse Engineering and Tracking 

LiveOverflow
Подписаться 885 тыс.
Просмотров 671 тыс.
50% 1

A friend told me that a GW2 trading bot implemented a dumb API. We are going to find and use it to track the bot.
Play Guild Wars 2:
account.arena.net/register
Fiddler: www.telerik.com/fiddler
.NET Reflector: www.red-gate.com/products/dot...
HxD: mh-nexus.de/en/hxd/
IDA Free: www.hex-rays.com/products/ida...
Windows VM: developer.microsoft.com/en-us...
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#ReverseEngineering

Опубликовано:

 

8 фев 2018

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 443   
@LiveOverflow
@LiveOverflow 6 лет назад
Bonus video with the analysis of the collected data will come within the next 24h. TL;DR summary: If you are a Guild Wars 2 player, don't worry about bots like that. It's child's play. Don't request ArenaNet to waste any resources on it.
@planktonfun1
@planktonfun1 6 лет назад
great work
@LiveOverflow
@LiveOverflow 6 лет назад
you mean: "learn how to speak English properly"?
@GRBtutorials
@GRBtutorials 6 лет назад
What's wrong with his way of speaking? He (and most Germans) speaks English better than many people in the world, including me. And I'm pretty good!
@LiveOverflow
@LiveOverflow 6 лет назад
As bad as yours?
@planktonfun1
@planktonfun1 6 лет назад
We all understand the video in English, you need global awareness education, English is not the main language of the world and should not be enforced because someone said so
@Cevans3535
@Cevans3535 6 лет назад
I just wanna say that I have watched several tutorials on reverse engineering binaries and I REALLY enjoyed your video because you not only showed what you did to find certain bits of information, but you explained your entire thought process AND you told us the things you did that didn't actually work. 99% of tutorials -- even the good ones -- often leave out explanations of the dead end roads they went down. And the reason that's so important is it helps people who are trying to learn reverse engineering the mindset/thought process they should have when approaching the subject. It's easy to mirror something you watch in a video and think you understand it only to try it on something else and quickly realize you don't really know where to begin or how to approach it. This is the first video I've come across of yours and I'm definitely checking out more after I write this, but I'm really hoping that you take this approach in all of your videos. If not, you should. This is super helpful and you're definitely onto something with this style of talking about a subject. Sorry for the long comment, but I just had to say this. Cheers!
@CardinalHijack
@CardinalHijack 6 лет назад
The way that you talk through your way of thinking is so good. Makes it so easy to follow your thought process and your reasons for doing things.
@mfiels
@mfiels 6 лет назад
3:31 Sending login credentials over HTTP? Oh boy...
@georgegx95
@georgegx95 6 лет назад
Well there's an endpoint that returns all users and their api keys.. HTTPS is a detail here, lol
@HardcoreMontages
@HardcoreMontages 6 лет назад
lmao
@mfiels
@mfiels 6 лет назад
George Gougoudis I left this comment before I saw the end, the logged in users endpoint is unbelievable!
@Hevletica
@Hevletica 6 лет назад
Phishy...
@dXXPacmanXXb
@dXXPacmanXXb 6 лет назад
these are no real login credentials.
@seanpianka1818
@seanpianka1818 6 лет назад
I love these videos. As large a python application developer, getting to explore more about this very unknown world (at least, to me) is super interesting. Keep the videos coming!
@cantucodes
@cantucodes 6 лет назад
Your videos are very informative. It's almost like you have to play detective to discover what you did. Of course, having the right tools under your tool belt also helps ;) Keep up the great videos!
@IdanHorowitz
@IdanHorowitz 6 лет назад
Great video. i really enjoy you reverse engineering these types of MMO bots, i would love you try doing it for more bots as its also very educational :D
@timfreeeed
@timfreeeed 6 лет назад
great documentation of your workflow. thanks
@gnif
@gnif 6 лет назад
Your strings are wide which is why IDA didn't notice them. You just need to tell IDA to include wide strings in the strings window (right click and configure)
@inx1819
@inx1819 3 года назад
thanks I'll keep that in mind
@nukexplosion6679
@nukexplosion6679 3 года назад
@@inx1819 What are you debugging?
@warflower69
@warflower69 6 лет назад
You showed me nothing I didn't already know, except how to put what I know to use! I appreciate the candor of narration as you work through the problem. That is one of the most important things for people to see, it's OK if you don't know precisely what they next thing you click on is going to do, that's how you learn. Great video, thank you.
@steinardarri
@steinardarri 6 лет назад
Really cool video, I like how you went the extra step and tracked thos bot users for data
@kubeface115
@kubeface115 6 лет назад
I don't even play GW2, yet this was utterly fascinating. You're a goddamn wizard.
@dalmaronthefirst2237
@dalmaronthefirst2237 4 года назад
GW2 has the single least toxic most helpful community I have ever met. Like srsly, its an amazing mmorpg.
@julianksterlarsen784
@julianksterlarsen784 6 лет назад
Super interessting! And crazy how it was possible to extract such valueable and private information. I bet there's thousands of other companies doing something similar.
@callumhilliscool
@callumhilliscool 6 лет назад
Very cool my friend, subscribed - wish there was more content like this!
@alexanderburton5990
@alexanderburton5990 6 лет назад
You deserve so many more subscribers. Please keep this content going :D
@bulletproof1453
@bulletproof1453 6 лет назад
Just found your channel. Seems to be educative and I believe I will learn a lot. Keep up the good work.
@nesu1645
@nesu1645 6 лет назад
I would like to see more game related reverse engineering videos. Keep it up.
@FreezeFrame175
@FreezeFrame175 6 лет назад
One of the best channels about reversing on youtube. Thanks for the video
@tangytech7641
@tangytech7641 6 лет назад
do more bot videos on popular mmos, this is interesting stuff
@Shuroii
@Shuroii 4 года назад
@ID3301 only really counts for online games tbh
@MoeJama5454
@MoeJama5454 3 года назад
Hearing that makes me think of someone I used to watch, but yeah this is very interesting
@minefunrapguy
@minefunrapguy 5 лет назад
How didn't I know about fiddler earlier? I love it and constantly mess around with it now! Danke dir
@TylerTraverse
@TylerTraverse 5 лет назад
You're so awesome. I love your videos so much! So much to learn, and I really like the way you present the information.
@Shinika01
@Shinika01 5 лет назад
Really interresting video.... I'm subscribing to see what's next :) And i will come back on your videos to see what else you have to teach. Thanks for the share, keep on the good work, keep giving us your taught process (mostly why i subscribed!) Good luck on RU-vid
@nicoper
@nicoper 6 лет назад
Awesome video as always. Guild Wars 2 is a great game, as well.
@Reneator
@Reneator 6 лет назад
Very good video about deep programming knowledge, without getting complex. It helped me!
@matthias1637
@matthias1637 6 лет назад
Thanks for this amazing video, you never fail to deliver :D
@lx6381
@lx6381 5 лет назад
Dein Video ist Gold wert, konnte dadurch echt viel lernen, danke^^
@IsAMank
@IsAMank 6 лет назад
Super cool video, and absolutely hilarious that such a simple request gave you the bot user's account APIs. Talk about a botch job from the bot developer!
@LiamDennehy
@LiamDennehy 6 лет назад
I don't think there is a single video of yours that hasn't had a #MindBlown moment for me. I know you think this is a bit mundane, but like all your work, yet again opening a whole world to my view. Thanks, keep up the great work!
@Dehvi_
@Dehvi_ 6 лет назад
Couple tips for Windows executable reverse engineering. 1) There are many programs you can use to check how an executable is compiled and packed, couple of my favorites are Detect it easy and peId. 2) You can use Process Hacker 2 to find strings in memory of an executable. Great video btw!
@alexionut6
@alexionut6 6 лет назад
This is just... WOW. Dude you're awesome. Keep it up!
@jungoogie
@jungoogie 6 лет назад
0_0 I don't know how I ended up here but I couldn't stop watching. This reminds me of how many different programs I find myself using from start to end with making game assets.
@PrinceRapthorne
@PrinceRapthorne 6 лет назад
I learned a lot today, thank you for this video :)
@zacharypriest2787
@zacharypriest2787 6 лет назад
I enjoyed this video! I will watch more of your videos :)
@its.moonjc
@its.moonjc 5 лет назад
Super interesting. Thank you for this.
@hallejohn
@hallejohn 6 лет назад
Ich habe keine Ahnung von GW2 und auch nicht vom Programmieren, aber es ist interessant und einigermaßen verständlich für mich. Dankeschön. =)
@ushelushel1
@ushelushel1 3 года назад
You've inspired me to get back in GW2 after almost a year of not playing it, thanks
@TurtleFul
@TurtleFul 6 лет назад
This is some impressive work man!
@cewa44
@cewa44 6 лет назад
WoW nice Love this video, thanks for showing me something new :D
@zandiskoul
@zandiskoul 6 лет назад
Your a boss man! This made me happy to watch.
@thebigvrguy4571
@thebigvrguy4571 6 лет назад
WoW, That is really amazing. It's inspiring.
@BenClerix
@BenClerix 6 лет назад
Subbed! Awesome videos ;) GW2 reddit brought me here!
@carlosgil2691
@carlosgil2691 5 лет назад
Excellent video! Best reverse engineering channel!
@phanmemviet2565
@phanmemviet2565 6 лет назад
I love this video. Please make more videos like this xD
@OthmanAlikhan
@OthmanAlikhan 5 лет назад
Thanks for the video, very interesting!
@MrRathkor
@MrRathkor 2 года назад
I legit spit my coffee out watching this at 7:30 in the morning when I saw you replay and edit the request to get the online users.
@EvanDear
@EvanDear 6 лет назад
I love your channel so, so much
@andretaulien398
@andretaulien398 6 лет назад
By the way, you can just load the memory dump into ida see the disassembly of whatever they tried to obfuscate/encrypt. Ida can also find strings in there, no need to do it manually.
@petrasjonuska6305
@petrasjonuska6305 6 лет назад
Andre Taulien It's cooler that way
@skypeon1
@skypeon1 6 лет назад
so many Lithuanians in the comment section, damn
@user-of4mr3tl5n
@user-of4mr3tl5n 5 лет назад
This guy could get employed by Microsoft Apple Google and Amazon all by himself and save these companies trillions ... He is mind-blowing smart. I use computers since i'm a kid and have strong knowledge about pretty much every computer related stuff but in this video I quickly realised how much of a noob I was. This video made me humble so bad. I'm shocked. Wow.
@dimitriygeorgiev9248
@dimitriygeorgiev9248 5 лет назад
Just awesomely crazy... Good job.
@klausgreinerfiorini
@klausgreinerfiorini 6 лет назад
I love your videos, i just got into the security market and i'm learning from 0 your videos will surely help a lot i've always wanted to make bots for games for the sake of it but never did it. I would love if you could make a video about android apps pen testing
@zxcghoul1275
@zxcghoul1275 3 года назад
Thanks for the video! you big helped
@dracau18
@dracau18 6 лет назад
Hello LiveOverflow, Like you I have analyse two bots from an other game, but in fidler the first bot use https and the second encrypted packet (TCP or UDP). My question is, how to decrypt these packets ? Thank you :)
@61Marsh
@61Marsh 6 лет назад
I would have never thought to reverse engineer the bot program to get all the api calls to their server. that's awesome.
@GamingMiscellaneous
@GamingMiscellaneous 5 лет назад
Very interesting. Good job
@Janrupf
@Janrupf 6 лет назад
Nice, I'm always learning something ;) And I'm always a bit suprised to read german Text. Well, I already know you live in Germany, but your englisch is perfect. BTW: I'm German too
@LiveOverflow
@LiveOverflow 6 лет назад
I think the developers of the trading bot are german. that's why the text was german in the TOS
@Janrupf
@Janrupf 6 лет назад
LiveOverflow Well, some of youre programms are german too, aren't they?
@jeffalbert8415
@jeffalbert8415 6 лет назад
You should do more of these documentary's where you reverse engineer a program in the wild.
@agito289
@agito289 3 года назад
wow what a great content, subscribed
@DedmenMiller
@DedmenMiller 6 лет назад
You could open the memdump (Yes it's a full memory dump) in IDA and let it automatically find/analyze the binary.
@snooter28
@snooter28 6 лет назад
Okay.. I didn't like the video until you got the entire list of users.. and then geeked out graphing some data.. You earned my like.. Thumbs up clicked :P
@ivangutowski
@ivangutowski 6 лет назад
Far, far above my level of knowledge and interest, however well explained and interesting to see what you discovered, even if I could not emulate this myself.
@kermitthehermit9373
@kermitthehermit9373 6 лет назад
Man!!I wanna be able to do all this. You're a genius
@morphman86
@morphman86 6 лет назад
Continue watching the channel, check a few other data forensic channels, check out the free online universities for Computer Forensic courses and you'll be a good way on the way to be able to do all these things. There are a few hacker conventions that also give good info on how it all works, with videos freely available here on RU-vid. Check out things like DefCon.
@NullPointer871ICant
@NullPointer871ICant 6 лет назад
It's not about being genius. Everyone can learn that just not everybody wants to.
@kermitthehermit9373
@kermitthehermit9373 6 лет назад
morphman86 can you please suggest me any of those universities? Thank you
@loongaming105
@loongaming105 6 лет назад
Udemy is a good one as well as nullbytes own university. I believe its skill stack. some of the packages you can find are like....idk 16$ for 100s of lectures and online classes. You arnt bound to them like a real college or university. There's no tests, no quizzes, no grades. Its all just based on you learning material. Access anywhere, any time.
@Silver9041
@Silver9041 6 лет назад
Exactly my thoughts, and even the comment 'I do not know how this works so I fiddle with it'; made me feel aware that this guy is good in being resilient and really good in self teaching.
@olfmombach260
@olfmombach260 6 лет назад
That was so interesting and fun to watch! The thing is, if I had attempted to do this kind of research, I would have given up after the first 5 minutes, because I know nothing about the workflow and how to interpret findings and outputs of these various programs (even most of the shown programs I did not know). So can you give a short explanation of how you collected this mass of knowledge over time? Ps: Schland :D
@LiveOverflow
@LiveOverflow 6 лет назад
guess how many times I attempted projects like this and gave up? Every time you do that, you learn a tiny little bit more. and at some point you succeed.
@dontreadmyprofilepicture5209
@dontreadmyprofilepicture5209 6 лет назад
I have no idea what is going on or where I am but I like this video, even though I understood none of it. I found it enjoying and your voice soothing. Keep making videos, 4am me is out & won't remember this comment :)
@sonycservice
@sonycservice 6 лет назад
What is written at the end of the 2 sentences in python "raw = open ..." and "with open ..." ?
@sucrose
@sucrose 6 лет назад
Very interesting. I used to make wallhacks for Soldier Front and aimbots for Gunbound when I was younger... much profits. These videos make me want to get back into it.
@TheMan83554
@TheMan83554 6 лет назад
Is it possible for you to look into some of the EVE online mob grinding bots? I've run into a couple on my space travels and I'm curious if I can help stomp them out.
@wildwest1832
@wildwest1832 6 лет назад
yeah good job explaining your approach, and what tools you used.
@Cajun82
@Cajun82 6 лет назад
craaazy stuff ...i have no clue about programming but this is crazyy :)
@rey1242
@rey1242 6 лет назад
As the bot requires validation to work, you can remove it by checking for strings related to the login page on IDA, the newr adresses will be the validation ones, then you just need to make it return true
@bestlty
@bestlty 6 лет назад
BEST CHANNEL EVER IN THE HISTORY OF RU-vid AND HUMAN CIVILIZATION
@Photoficaj
@Photoficaj 6 лет назад
Super awesome Sir.
@CabbageGod
@CabbageGod 6 лет назад
I'm glad you waited for the service to shut down before doing this, a buddy of mine found this issue and showed me how to perform it ages ago. We always used to mess with those filthy cheaters. >:)
@lpoki8897
@lpoki8897 6 лет назад
I'd love it if someone posted this video on the site where the bot was sold. I don't think they'd be all to happy with it if they found out it just spits your API keys out on request.
@ishimarumasaki1998
@ishimarumasaki1998 6 лет назад
You earned a subscriber, don’t let me down
@blairsaid
@blairsaid 6 лет назад
DUDE YOU ARE A FUCKING BOSS. I'm super inspired to try some of these tools. Thank you so much. Love your channel.
@KrzysiuNet
@KrzysiuNet 5 лет назад
For string searching I like ProcessHacker 2 - double click on the process>Memory>[Strings...]>Set the settings>Optionally filter output.
@amadlover
@amadlover Год назад
Very awesome and inspiring
@muhammadadibdzulfikar9584
@muhammadadibdzulfikar9584 6 лет назад
This is amazing !! Great!! Get more on mmorpg ;]
@Garkolym
@Garkolym 6 лет назад
Alter, wie geil du einfach bist :D Verdienst auf JEDEN Fall mehr Abonnenten!
@dominikletzplayz
@dominikletzplayz 6 лет назад
Garkolym gib ich dir recht!
@trapworld3023
@trapworld3023 4 года назад
Im in college and watching every single video of yours so that i able to solve any ctf challenges thanks men: ∆
@markayala7752
@markayala7752 6 лет назад
you are awsome , fan from Egypt :)
@SeekersMentality
@SeekersMentality Год назад
you are defo in the top 5 Comp Sci/Software Eng/Hacking channels.
@purplenightdrive627
@purplenightdrive627 6 лет назад
This is amezing thank you so much for beautifull video
@nikize
@nikize 6 лет назад
I can recommend ILSpy Smartscreen primarily checks code signing certificate of the program (see the Publisher) - not much of hashes and how many are using it. To avoid the smartscreen you must supply your app (with certificate) to Microsoft. Visual Studio should be able to open the memory dump, and also let you step thru it if you want. (I really hope this is available in the community version)
@schukaproallied9834
@schukaproallied9834 6 лет назад
Great video
@matthewdev
@matthewdev 3 года назад
Could you explain that hexdump cleaning script, how it works?
@satriowahyutomo
@satriowahyutomo 6 лет назад
how could you know if with deleting the username and password parameter will discover the entire API key?
@yuyuko_s75
@yuyuko_s75 6 лет назад
Fun fact: You just gave pirates a head start in pirating the bot.
@cyanus7347
@cyanus7347 5 лет назад
so it can be pirated
@deathhog
@deathhog 5 лет назад
Fun Fact: he just gave the devs a free access key to ban all those players too....
@ayushman_sr
@ayushman_sr 5 лет назад
you are my favorite channel ☺
@UrbanGT
@UrbanGT 6 лет назад
Nice video! Awesome reverse engineering...
@Evercreeper
@Evercreeper Год назад
your intro is awesome
@WolfrostWasTaken
@WolfrostWasTaken 6 лет назад
If the memory contains non-obfuscated data you could have easily debugged using some tools like OllyDbg or even Cheat Engine (even if OllyDbg provides a list of strings really similar to the IDA one)
@AZZAMNO1
@AZZAMNO1 5 лет назад
how do i edit and replay a XHR ?? i need it for uhhh.... something
@WiseWeeabo
@WiseWeeabo 4 года назад
it's hard to really stop injection from happening, when it comes to the mouse clicks you have to rely on the system flag to tell if the clicks are authentic, these need to come from certified drivers (although you can also just patch whatever checks for the flag on the client)
@fltfathin
@fltfathin Год назад
a bit late you probably know it: there's also hardware route of custom usb hardware and external hardware OCR, best way is always in game design
@lockstar1019
@lockstar1019 5 лет назад
I have no idea whats going on and yet i am going to watch part 2
@We-kv3ze
@We-kv3ze 6 лет назад
What mouse do you have?
@JGunlimited
@JGunlimited 6 лет назад
How did you use the same url to load different pages? Ida version 5.0 and 7.0?
@LiveOverflow
@LiveOverflow 6 лет назад
Old recording vs new recording ;)
@mrfincher
@mrfincher 6 лет назад
Awesome topic
@AholicKnight
@AholicKnight 5 лет назад
This video is strangely motivational.
@XRADU97
@XRADU97 5 лет назад
You can do something similar with savewizard, a ps4 save editor?
Далее
MMORPG Bot part 2 - Some thoughts on the data
14:17
Просмотров 227 тыс.
Try not to Laugh Game!
00:38
Просмотров 1,7 млн
[stream] USB: Reverse Engineering and Writing Drivers
2:39:41
Attacking LLM - Prompt Injection
13:23
Просмотров 368 тыс.
Hacker Tweets Explained
13:47
Просмотров 158 тыс.
My YouTube Financials - The Future of LiveOverflow
35:00
Local Root Exploit in HospitalRun Software
20:48
Просмотров 67 тыс.
Windows Game Hacking with Ghidra and Cheat Engine
15:32
Hacking Google Cloud?
21:59
Просмотров 123 тыс.
Anatomy of Exploiting MMORPG’s
46:23
Просмотров 10 тыс.
Try not to Laugh Game!
00:38
Просмотров 1,7 млн