Bonus video with the analysis of the collected data will come within the next 24h. TL;DR summary: If you are a Guild Wars 2 player, don't worry about bots like that. It's child's play. Don't request ArenaNet to waste any resources on it.
@planktonfun16 жыл бұрын
great work
@LiveOverflow6 жыл бұрын
you mean: "learn how to speak English properly"?
@GRBtutorials6 жыл бұрын
What's wrong with his way of speaking? He (and most Germans) speaks English better than many people in the world, including me. And I'm pretty good!
@LiveOverflow6 жыл бұрын
As bad as yours?
@planktonfun16 жыл бұрын
We all understand the video in English, you need global awareness education, English is not the main language of the world and should not be enforced because someone said so
@Cevans35356 жыл бұрын
I just wanna say that I have watched several tutorials on reverse engineering binaries and I REALLY enjoyed your video because you not only showed what you did to find certain bits of information, but you explained your entire thought process AND you told us the things you did that didn't actually work. 99% of tutorials -- even the good ones -- often leave out explanations of the dead end roads they went down. And the reason that's so important is it helps people who are trying to learn reverse engineering the mindset/thought process they should have when approaching the subject. It's easy to mirror something you watch in a video and think you understand it only to try it on something else and quickly realize you don't really know where to begin or how to approach it. This is the first video I've come across of yours and I'm definitely checking out more after I write this, but I'm really hoping that you take this approach in all of your videos. If not, you should. This is super helpful and you're definitely onto something with this style of talking about a subject. Sorry for the long comment, but I just had to say this. Cheers!
@gnif6 жыл бұрын
Your strings are wide which is why IDA didn't notice them. You just need to tell IDA to include wide strings in the strings window (right click and configure)
@inx18194 жыл бұрын
thanks I'll keep that in mind
@nukexplosion66794 жыл бұрын
@@inx1819 What are you debugging?
@kubeface1156 жыл бұрын
I don't even play GW2, yet this was utterly fascinating. You're a goddamn wizard.
@mfiels6 жыл бұрын
3:31 Sending login credentials over HTTP? Oh boy...
@georgegx956 жыл бұрын
Well there's an endpoint that returns all users and their api keys.. HTTPS is a detail here, lol
@HardcoreMontages6 жыл бұрын
lmao
@mfiels6 жыл бұрын
George Gougoudis I left this comment before I saw the end, the logged in users endpoint is unbelievable!
@Hevletica6 жыл бұрын
Phishy...
@dXXPacmanXXb6 жыл бұрын
these are no real login credentials.
@CardinalHijack6 жыл бұрын
The way that you talk through your way of thinking is so good. Makes it so easy to follow your thought process and your reasons for doing things.
@tangytech76416 жыл бұрын
do more bot videos on popular mmos, this is interesting stuff
@Shuroii5 жыл бұрын
@ID3301 only really counts for online games tbh
@MoeJama54544 жыл бұрын
Hearing that makes me think of someone I used to watch, but yeah this is very interesting
@warflower696 жыл бұрын
You showed me nothing I didn't already know, except how to put what I know to use! I appreciate the candor of narration as you work through the problem. That is one of the most important things for people to see, it's OK if you don't know precisely what they next thing you click on is going to do, that's how you learn. Great video, thank you.
@julianksterlarsen7846 жыл бұрын
Super interessting! And crazy how it was possible to extract such valueable and private information. I bet there's thousands of other companies doing something similar.
@FreezeFrame1756 жыл бұрын
One of the best channels about reversing on youtube. Thanks for the video
@seanpianka18186 жыл бұрын
I love these videos. As large a python application developer, getting to explore more about this very unknown world (at least, to me) is super interesting. Keep the videos coming!
@160.176 жыл бұрын
This guy could get employed by Microsoft Apple Google and Amazon all by himself and save these companies trillions ... He is mind-blowing smart. I use computers since i'm a kid and have strong knowledge about pretty much every computer related stuff but in this video I quickly realised how much of a noob I was. This video made me humble so bad. I'm shocked. Wow.
@gabriel-x7x9g17 күн бұрын
Why would he want to work to those vile companies? He is better than them.
@MrRathkor3 жыл бұрын
I legit spit my coffee out watching this at 7:30 in the morning when I saw you replay and edit the request to get the online users.
@timfreeeed6 жыл бұрын
great documentation of your workflow. thanks
@andretaulien3986 жыл бұрын
By the way, you can just load the memory dump into ida see the disassembly of whatever they tried to obfuscate/encrypt. Ida can also find strings in there, no need to do it manually.
@petrasjonuska63056 жыл бұрын
Andre Taulien It's cooler that way
@skypeon16 жыл бұрын
so many Lithuanians in the comment section, damn
@ushelushel14 жыл бұрын
You've inspired me to get back in GW2 after almost a year of not playing it, thanks
@KrzysiuNet6 жыл бұрын
For string searching I like ProcessHacker 2 - double click on the process>Memory>[Strings...]>Set the settings>Optionally filter output.
@nesu16456 жыл бұрын
I would like to see more game related reverse engineering videos. Keep it up.
@Dotexe2456 жыл бұрын
You deserve so many more subscribers. Please keep this content going :D
@Dehvi_6 жыл бұрын
Couple tips for Windows executable reverse engineering. 1) There are many programs you can use to check how an executable is compiled and packed, couple of my favorites are Detect it easy and peId. 2) You can use Process Hacker 2 to find strings in memory of an executable. Great video btw!
@cantucodes6 жыл бұрын
Your videos are very informative. It's almost like you have to play detective to discover what you did. Of course, having the right tools under your tool belt also helps ;) Keep up the great videos!
@lx63815 жыл бұрын
Dein Video ist Gold wert, konnte dadurch echt viel lernen, danke^^
@minefunrapguy6 жыл бұрын
How didn't I know about fiddler earlier? I love it and constantly mess around with it now! Danke dir
@LiamDennehy6 жыл бұрын
I don't think there is a single video of yours that hasn't had a #MindBlown moment for me. I know you think this is a bit mundane, but like all your work, yet again opening a whole world to my view. Thanks, keep up the great work!
@61Marsh6 жыл бұрын
I would have never thought to reverse engineer the bot program to get all the api calls to their server. that's awesome.
@IdanHorowitz6 жыл бұрын
Great video. i really enjoy you reverse engineering these types of MMO bots, i would love you try doing it for more bots as its also very educational :D
@steinardarri6 жыл бұрын
Really cool video, I like how you went the extra step and tracked thos bot users for data
@carlosgil26915 жыл бұрын
Excellent video! Best reverse engineering channel!
@IsAMank6 жыл бұрын
Super cool video, and absolutely hilarious that such a simple request gave you the bot user's account APIs. Talk about a botch job from the bot developer!
@rey12426 жыл бұрын
As the bot requires validation to work, you can remove it by checking for strings related to the login page on IDA, the newr adresses will be the validation ones, then you just need to make it return true
@nicoper6 жыл бұрын
Awesome video as always. Guild Wars 2 is a great game, as well.
@snooter286 жыл бұрын
Okay.. I didn't like the video until you got the entire list of users.. and then geeked out graphing some data.. You earned my like.. Thumbs up clicked :P
@patchouli_s756 жыл бұрын
Fun fact: You just gave pirates a head start in pirating the bot.
@cyanus73476 жыл бұрын
so it can be pirated
@deathhog5 жыл бұрын
Fun Fact: he just gave the devs a free access key to ban all those players too....
@callumhilliscool6 жыл бұрын
Very cool my friend, subscribed - wish there was more content like this!
@bestlty6 жыл бұрын
BEST CHANNEL EVER IN THE HISTORY OF KZbin AND HUMAN CIVILIZATION
@BenClerix6 жыл бұрын
Subbed! Awesome videos ;) GW2 reddit brought me here!
@alexionut66 жыл бұрын
This is just... WOW. Dude you're awesome. Keep it up!
@fedekotek6 жыл бұрын
I have 0 dev experience and I dont play gw2. I watched the entire thing. Time to get control of my life.
@jungoogie6 жыл бұрын
0_0 I don't know how I ended up here but I couldn't stop watching. This reminds me of how many different programs I find myself using from start to end with making game assets.
@DedmenMiller6 жыл бұрын
You could open the memdump (Yes it's a full memory dump) in IDA and let it automatically find/analyze the binary.
@mmet0diev2 жыл бұрын
you are defo in the top 5 Comp Sci/Software Eng/Hacking channels.
@ayyildiz-ccc6 жыл бұрын
Just found your channel. Seems to be educative and I believe I will learn a lot. Keep up the good work.
@hallejohn6 жыл бұрын
Ich habe keine Ahnung von GW2 und auch nicht vom Programmieren, aber es ist interessant und einigermaßen verständlich für mich. Dankeschön. =)
@zandiskoul6 жыл бұрын
Your a boss man! This made me happy to watch.
@TylerTraverse5 жыл бұрын
You're so awesome. I love your videos so much! So much to learn, and I really like the way you present the information.
@Cubinator736 жыл бұрын
If you're dealing with .NET assemblies, don't bother with Reflector, take a look at dnspy.
@lmaoroflcopter6 жыл бұрын
Cubinator73 dnspy, ilspy and greywolf are my go-tos for messing with .net. Greywolf by Digital bodyguard lets you patch the il and export the exe, great for messing with execution flow and logic, or in my case patching out an annoying taskbar notification thing for a driver utility.
@nobytes24 жыл бұрын
dotpeek also pretty good, there's also apps strictly for strings. If you install flare vm you get tons of malware analysis tools.
@dimitriygeorgiev92485 жыл бұрын
Just awesomely crazy... Good job.
@CabbageGod6 жыл бұрын
I'm glad you waited for the service to shut down before doing this, a buddy of mine found this issue and showed me how to perform it ages ago. We always used to mess with those filthy cheaters. >:)
@matthias16376 жыл бұрын
Thanks for this amazing video, you never fail to deliver :D
@Reneator6 жыл бұрын
Very good video about deep programming knowledge, without getting complex. It helped me!
@lpoki88976 жыл бұрын
I'd love it if someone posted this video on the site where the bot was sold. I don't think they'd be all to happy with it if they found out it just spits your API keys out on request.
@Anonymouspock6 жыл бұрын
The mouse key hook actually uses Windows API to intercept and maybe send raw input, no injection required.
@AholicKnight5 жыл бұрын
This video is strangely motivational.
@GamingMiscellaneous5 жыл бұрын
Very interesting. Good job
@thebigvrguy45716 жыл бұрын
WoW, That is really amazing. It's inspiring.
@TurtleFul6 жыл бұрын
This is some impressive work man!
@EvanDear6 жыл бұрын
I love your channel so, so much
@tomcho82216 жыл бұрын
The dump format isn't raw, it's stores all sorts of information other than the memory like open handles and threads.
@zacharypriest27876 жыл бұрын
I enjoyed this video! I will watch more of your videos :)
@PrinceRapthorne6 жыл бұрын
I learned a lot today, thank you for this video :)
@Shinika016 жыл бұрын
Really interresting video.... I'm subscribing to see what's next :) And i will come back on your videos to see what else you have to teach. Thanks for the share, keep on the good work, keep giving us your taught process (mostly why i subscribed!) Good luck on KZbin
@phanmemviet25656 жыл бұрын
I love this video. Please make more videos like this xD
@klausgreinerfiorini6 жыл бұрын
I love your videos, i just got into the security market and i'm learning from 0 your videos will surely help a lot i've always wanted to make bots for games for the sake of it but never did it. I would love if you could make a video about android apps pen testing
@jeffalbert84156 жыл бұрын
You should do more of these documentary's where you reverse engineer a program in the wild.
@dontreadmyprofilepicture52096 жыл бұрын
I have no idea what is going on or where I am but I like this video, even though I understood none of it. I found it enjoying and your voice soothing. Keep making videos, 4am me is out & won't remember this comment :)
@kermitthehermit93736 жыл бұрын
Man!!I wanna be able to do all this. You're a genius
@morphman866 жыл бұрын
Continue watching the channel, check a few other data forensic channels, check out the free online universities for Computer Forensic courses and you'll be a good way on the way to be able to do all these things. There are a few hacker conventions that also give good info on how it all works, with videos freely available here on KZbin. Check out things like DefCon.
@NullPointer871ICant6 жыл бұрын
It's not about being genius. Everyone can learn that just not everybody wants to.
@kermitthehermit93736 жыл бұрын
morphman86 can you please suggest me any of those universities? Thank you
@loongaming1056 жыл бұрын
Udemy is a good one as well as nullbytes own university. I believe its skill stack. some of the packages you can find are like....idk 16$ for 100s of lectures and online classes. You arnt bound to them like a real college or university. There's no tests, no quizzes, no grades. Its all just based on you learning material. Access anywhere, any time.
@Wintergin6 жыл бұрын
Exactly my thoughts, and even the comment 'I do not know how this works so I fiddle with it'; made me feel aware that this guy is good in being resilient and really good in self teaching.
@cewa446 жыл бұрын
WoW nice Love this video, thanks for showing me something new :D
@sucrose6 жыл бұрын
Very interesting. I used to make wallhacks for Soldier Front and aimbots for Gunbound when I was younger... much profits. These videos make me want to get back into it.
@blank66045 жыл бұрын
7:14 press Windows [no Ctrl +] a to mark every thing in the wimdow your in. (Only text and numbers)
@yukkuriwa5 жыл бұрын
You mean, CTRL + A, Right?
@blank66045 жыл бұрын
@@yukkuriwa yes.
@Cajun826 жыл бұрын
craaazy stuff ...i have no clue about programming but this is crazyy :)
@WiseWeeabo5 жыл бұрын
it's hard to really stop injection from happening, when it comes to the mouse clicks you have to rely on the system flag to tell if the clicks are authentic, these need to come from certified drivers (although you can also just patch whatever checks for the flag on the client)
@fltfathin2 жыл бұрын
a bit late you probably know it: there's also hardware route of custom usb hardware and external hardware OCR, best way is always in game design
@ishimarumasaki19986 жыл бұрын
You earned a subscriber, don’t let me down
@its.moonjc6 жыл бұрын
Super interesting. Thank you for this.
@lockstar10195 жыл бұрын
I have no idea whats going on and yet i am going to watch part 2
@agito2894 жыл бұрын
wow what a great content, subscribed
@VirtualMatterTails4 жыл бұрын
Thanks for the video! you big helped
@nikize6 жыл бұрын
I can recommend ILSpy Smartscreen primarily checks code signing certificate of the program (see the Publisher) - not much of hashes and how many are using it. To avoid the smartscreen you must supply your app (with certificate) to Microsoft. Visual Studio should be able to open the memory dump, and also let you step thru it if you want. (I really hope this is available in the community version)
@WolfrostWasTaken6 жыл бұрын
If the memory contains non-obfuscated data you could have easily debugged using some tools like OllyDbg or even Cheat Engine (even if OllyDbg provides a list of strings really similar to the IDA one)
@tinoc64516 жыл бұрын
dayum son, your hacking skills are over the top!
@ayushman_sr5 жыл бұрын
you are my favorite channel ☺
@OthmanAlikhan5 жыл бұрын
Thanks for the video, very interesting!
@DueLosGaming6 жыл бұрын
send the graph to data is beautiful.
@theaifam56 жыл бұрын
For dotNet reversing is better to use dnSpy which have better integration and more features.
@Zhung364 жыл бұрын
I just realized that I had watched this video before, not knowing about GW2 and I'm quite intrigued by how games' economy works, but not the games itself (since I'm not MMORPG kind of player) Then two years later I've already addicted to it and then stumbled this video again browsing GW2 economy subreddit How the table have turned... I'm gonna watch it again
@trapworld30235 жыл бұрын
Im in college and watching every single video of yours so that i able to solve any ctf challenges thanks men: ∆
@danielkrajnik38173 жыл бұрын
2:08 this that's what sold it to me, your videos are so good ☉_☉
@Evercreeper2 жыл бұрын
your intro is awesome
@Janrupf6 жыл бұрын
Nice, I'm always learning something ;) And I'm always a bit suprised to read german Text. Well, I already know you live in Germany, but your englisch is perfect. BTW: I'm German too
@LiveOverflow6 жыл бұрын
I think the developers of the trading bot are german. that's why the text was german in the TOS
@Janrupf6 жыл бұрын
LiveOverflow Well, some of youre programms are german too, aren't they?
@OllyWood6886 жыл бұрын
That clicking in the background music sounds like someone munching right next to my ear and I can't bear it :c Glad it stops after around 1 minute
@OllyWood6886 жыл бұрын
I also learned new things here and that's worth a like and a sub :)
@medjassertoubib44676 жыл бұрын
i love reversing . you are my 2nd hero . +rep :)
@LiveOverflow6 жыл бұрын
2nd hero? Who is first!!??!?!??
@medjassertoubib44676 жыл бұрын
LiveOverflow someone named zonz he teach me how to reverse
@olfmombach2606 жыл бұрын
That was so interesting and fun to watch! The thing is, if I had attempted to do this kind of research, I would have given up after the first 5 minutes, because I know nothing about the workflow and how to interpret findings and outputs of these various programs (even most of the shown programs I did not know). So can you give a short explanation of how you collected this mass of knowledge over time? Ps: Schland :D
@LiveOverflow6 жыл бұрын
guess how many times I attempted projects like this and gave up? Every time you do that, you learn a tiny little bit more. and at some point you succeed.
@ivangutowski6 жыл бұрын
Far, far above my level of knowledge and interest, however well explained and interesting to see what you discovered, even if I could not emulate this myself.
@blairsaid6 жыл бұрын
DUDE YOU ARE A FUCKING BOSS. I'm super inspired to try some of these tools. Thank you so much. Love your channel.
@igeljaeger6 жыл бұрын
jaja sehr schönes video Hans
@markayala77526 жыл бұрын
you are awsome , fan from Egypt :)
@satriowahyutomo6 жыл бұрын
how could you know if with deleting the username and password parameter will discover the entire API key?
@lugux5654 жыл бұрын
This bot looks like coded in AutoIt. Why did not you just try to decompile with Exe2Auto in case it was an autoit file? Maybethe source was obfuscated but this language is easy to deobfuscate.
@UsmanAbdulHalim6 жыл бұрын
I'm more interested on unpacking that binary files. The crazy thing, I did some reversing on a private server of a game launcher back then, what I didn't expect after unpack the binary was that the launcher uses somekind of remote sql to fetch the login data. I can even see the database and it's password for connecting to remote server.
@sonycservice6 жыл бұрын
What is written at the end of the 2 sentences in python "raw = open ..." and "with open ..." ?