QUOTE(khelben @ May 23 2012, 10:18 AM)
No doubt, but there were a lot of factors that contributed to WoW's decline- Game going in the wrong direction - lots of recycled content, game being trivialized
- Long downtimes
- Bad customer service
D3 account can be hacked via public game, might be explanation to those acc hecked
|
|
May 23 2012, 10:32 AM
|
![]() ![]() ![]() ![]() ![]()
Senior Member
837 posts Joined: Mar 2005 |
|
|
|
|
|
|
May 23 2012, 11:54 AM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,947 posts Joined: Nov 2005 |
QUOTE(I<3LYN @ May 23 2012, 05:17 AM) didn't hack anyone as its complex for automation, i just tested with a friend for over an hour.you just need to replace some of your session particulars with another person, and for a short time you'll be in control of the other party, then you get errors. My suspicions are the same as Bashiok, this was well coordinated, and the guys targeted people from the start. Collected the passwords and details. Then they did the "hack at once. |
|
|
May 23 2012, 12:01 PM
|
![]() ![]() ![]() ![]() ![]()
Senior Member
997 posts Joined: Feb 2007 |
QUOTE(VinluV @ May 23 2012, 11:54 AM) didn't hack anyone as its complex for automation, i just tested with a friend for over an hour. I still don't understand why the game server would pass your session token to other members in the group and vice versa. I haven't done any testing but a wireshark or tcpdump file would interest me very much.you just need to replace some of your session particulars with another person, and for a short time you'll be in control of the other party, then you get errors. My suspicions are the same as Bashiok, this was well coordinated, and the guys targeted people from the start. Collected the passwords and details. Then they did the "hack at once. |
|
|
May 23 2012, 12:29 PM
|
![]() ![]() ![]() ![]()
Senior Member
614 posts Joined: Sep 2009 |
QUOTE(VinluV @ May 23 2012, 11:54 AM) didn't hack anyone as its complex for automation, i just tested with a friend for over an hour. record a video... expose blizzard blaming technique....you just need to replace some of your session particulars with another person, and for a short time you'll be in control of the other party, then you get errors. My suspicions are the same as Bashiok, this was well coordinated, and the guys targeted people from the start. Collected the passwords and details. Then they did the "hack at once. now blizzard kept blaming the players. |
|
|
May 23 2012, 12:32 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,816 posts Joined: Apr 2007 |
QUOTE(VinluV @ May 23 2012, 11:54 AM) didn't hack anyone as its complex for automation, i just tested with a friend for over an hour. you just need to replace some of your session particulars with another person, and for a short time you'll be in control of the other party, then you get errors. My suspicions are the same as Bashiok, this was well coordinated, and the guys targeted people from the start. Collected the passwords and details. Then they did the "hack at once. QUOTE(I<3LYN @ May 23 2012, 12:29 PM) ^ +1 to this. The way blizzard posts the formal announcement is like, blaming players for not being careful/secured enough; and mentions nothing about the exploits. |
|
|
May 23 2012, 12:32 PM
|
![]() ![]() ![]() ![]()
Senior Member
614 posts Joined: Sep 2009 |
|
|
|
|
|
|
May 23 2012, 01:57 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,044 posts Joined: Dec 2008 From: 127.0.0.1 |
|
|
|
May 23 2012, 02:00 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,202 posts Joined: Jan 2003 From: THE ONE AND ONLY CHOO CHOO TRAIN KINGDOM |
|
|
|
May 23 2012, 02:06 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,816 posts Joined: Apr 2007 |
QUOTE(Deimos Tel`Arin @ May 23 2012, 02:00 PM) True. But I'm not surprised, that's how most of the business organisations AND the government works... play "Tai-chi" (push the blame to end users/citizen/anyone else than themselves)Sigh, only hope Blizzard will fix this as soon as possible, doesn't matter if they don't want to admit their mistakes.. just fix it before my final exam is over This post has been edited by polarzbearz: May 23 2012, 02:07 PM |
|
|
May 23 2012, 02:10 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,202 posts Joined: Jan 2003 From: THE ONE AND ONLY CHOO CHOO TRAIN KINGDOM |
QUOTE(polarzbearz @ May 23 2012, 02:06 PM) True. But I'm not surprised, that's how most of the business organisations AND the government works... play "Tai-chi" (push the blame to end users/citizen/anyone else than themselves) aye. at least valve admitted.Sigh, only hope Blizzard will fix this as soon as possible, doesn't matter if they don't want to admit their mistakes.. just fix it before my final exam is over |
|
|
May 23 2012, 02:20 PM
|
![]() ![]() ![]()
Junior Member
422 posts Joined: Sep 2008 |
|
|
|
May 23 2012, 03:43 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,947 posts Joined: Nov 2005 |
QUOTE(farkinid @ May 23 2012, 12:01 PM) I still don't understand why the game server would pass your session token to other members in the group and vice versa. I haven't done any testing but a wireshark or tcpdump file would interest me very much. here's the setup tho a very very simplified one.2 pc in the same network. By network I mean me and mate using my router. No opendns, No dns crypt, No authenticator used, firewall and my IPS turned off. after trading and dropping items left and right for about half an hour and monitoring packets with tcpdump, i just copied some token values from my friend to my packets (a certain open source scarab javascript packet interceptor i bet you know was used For a few seconds, i got him off his account. Then I got the i got kicked of battle net error. what i can suspect is that my token and session weren't matching the ones on battlenet so i got kicked off, as the next few packets sent from me was using my original values, instead of the "malformed" packet. Its doable but based on my setup its quite a below basic one, its still a long way for me. Will try to pass u a dump with better values if i can get some sort of poc. edit: wouldn't be surprised if chinese have pwned bnet This post has been edited by VinluV: May 23 2012, 03:45 PM |
|
|
May 23 2012, 03:58 PM
|
![]() ![]() ![]() ![]() ![]()
Senior Member
997 posts Joined: Feb 2007 |
QUOTE(VinluV @ May 23 2012, 03:43 PM) here's the setup tho a very very simplified one. Hmm interesting.2 pc in the same network. By network I mean me and mate using my router. No opendns, No dns crypt, No authenticator used, firewall and my IPS turned off. after trading and dropping items left and right for about half an hour and monitoring packets with tcpdump, i just copied some token values from my friend to my packets (a certain open source scarab javascript packet interceptor i bet you know was used For a few seconds, i got him off his account. Then I got the i got kicked of battle net error. what i can suspect is that my token and session weren't matching the ones on battlenet so i got kicked off, as the next few packets sent from me was using my original values, instead of the "malformed" packet. Its doable but based on my setup its quite a below basic one, its still a long way for me. Will try to pass u a dump with better values if i can get some sort of poc. edit: wouldn't be surprised if chinese have pwned bnet If you have any interesting dumps, please send them my way. But I still don't understand Bliz's need to allow user machines to communicate with each other. I thought all the heavy lifting was done on the servers and the result was sent to the user machines. Unless somebody has a way to parse token data and reconstruct login values, then this may not work. Still it does sound possible. |
|
|
|
|
|
May 23 2012, 04:01 PM
|
![]() ![]()
Junior Member
261 posts Joined: Jul 2009 |
QUOTE(VinluV @ May 23 2012, 03:43 PM) here's the setup tho a very very simplified one. What you described is the typical man in the middle attack where a hacker sits some where inside the same network as you are and use packet siffer to sniff out the packet s you send and receive to Blizzard server.2 pc in the same network. By network I mean me and mate using my router. No opendns, No dns crypt, No authenticator used, firewall and my IPS turned off. after trading and dropping items left and right for about half an hour and monitoring packets with tcpdump, i just copied some token values from my friend to my packets (a certain open source scarab javascript packet interceptor i bet you know was used For a few seconds, i got him off his account. Then I got the i got kicked of battle net error. what i can suspect is that my token and session weren't matching the ones on battlenet so i got kicked off, as the next few packets sent from me was using my original values, instead of the "malformed" packet. Its doable but based on my setup its quite a below basic one, its still a long way for me. Will try to pass u a dump with better values if i can get some sort of poc. edit: wouldn't be surprised if chinese have pwned bnet This is almost undoable on the open internet. I have been reading the Diablo 3 official forum and really tempted to try to replicate or some how prove Blizzard is covering up and downplay the whole issue while at the same time keep blaming the users for hacking. This is even worse when combined with fanboys on the forum insulting and accusing people of lying about getting hacked with an authenticator. |
|
|
May 23 2012, 04:04 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,947 posts Joined: Nov 2005 |
QUOTE(farkinid @ May 23 2012, 03:58 PM) Hmm interesting. probably due to heavy loads on the server. If you have any interesting dumps, please send them my way. But I still don't understand Bliz's need to allow user machines to communicate with each other. I thought all the heavy lifting was done on the servers and the result was sent to the user machines. Unless somebody has a way to parse token data and reconstruct login values, then this may not work. Still it does sound possible. Wouldn't be surprised that companies would choose the easy and less secure way out of a problem. I've not played wow but some guys on my d3 public games told me you can use wow hacks on d3. Unproven as i don't play wow or have any knowledge of it. If u know any hitb/hackerspace fellows, they may have doxed it as well. edit: just thought of the whisper and message function, not sure if can directly ping user ip/id from whispering. Any thoughts? |
|
|
May 23 2012, 04:09 PM
|
![]() ![]() ![]() ![]()
Senior Member
614 posts Joined: Sep 2009 |
QUOTE(VinluV @ May 23 2012, 04:04 PM) probably due to heavy loads on the server. with my understanding of the battle.net 1.0 protocol.. nope you cant get any network info by whispering/messaging a player.Wouldn't be surprised that companies would choose the easy and less secure way out of a problem. I've not played wow but some guys on my d3 public games told me you can use wow hacks on d3. Unproven as i don't play wow or have any knowledge of it. If u know any hitb/hackerspace fellows, they may have doxed it as well. edit: just thought of the whisper and message function, not sure if can directly ping user ip/id from whispering. Any thoughts? not really sure about battle.net 2.0 though. |
|
|
May 23 2012, 04:17 PM
|
![]() ![]()
Junior Member
56 posts Joined: May 2007 |
|
|
|
May 23 2012, 04:47 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,947 posts Joined: Nov 2005 |
QUOTE(neoengsheng @ May 23 2012, 04:01 PM) What you described is the typical man in the middle attack where a hacker sits some where inside the same network as you are and use packet siffer to sniff out the packet s you send and receive to Blizzard server. The MITM is very highly dependant on where the hacker location is as well.This is almost undoable on the open internet. I have been reading the Diablo 3 official forum and really tempted to try to replicate or some how prove Blizzard is covering up and downplay the whole issue while at the same time keep blaming the users for hacking. This is even worse when combined with fanboys on the forum insulting and accusing people of lying about getting hacked with an authenticator. Has to be close to Bnet server or piggybacking tmnut in order to capture a proper dump. edit: just informed that there is a new type of boy/man in the browser attack as well. This post has been edited by VinluV: May 23 2012, 04:52 PM |
| Change to: | 0.0169sec
0.39
5 queries
GZIP Disabled
Time is now: 1st December 2025 - 08:58 AM |