09-08-2007, 01:01 PM
hi everyone, I was intrigued about how individuals used programs to send data to servers and vice versa, hence allowing them to manipulate the servers into doing a specified task. Kinda like an SQL Injection lol.
Anywho I have a few questions regarding the use of this technique. Varying from, safety, to whats actually taking place. I have read over many of the current posts defining how its done, and in a sense, what is taking place. Well let me get started on the questions...
1) In the aspect of taking packets and sending them back and fourth, I noticed that certain "codes" define the given action, and I was wondering, is the actual code like a command? you know for example
XX[yyyyyyyyyy] = Drop this or do this, or something of the sort?
2) When using this technique is it possible for the "warden(s)" to scan your game and simply verify that what is taking place is actually legit? Example:
I kill monster, he drops something I like, I find the packet(s) that is implementing this action, and repeat it, warden does a sort of drive by scan, notices that it would be impossible (or nearly) for 2 of the exact same drops to take place (not to mention the possibility of the items having the same exact ID tag), warden verifies that I didn't actually kill the monster, and closes my account.
It was something I was greatly considering could take place, more so the second question then the first, cause it wouldn't surprise me if the security measurements implemented (I may be a little misconceived as far as that is concerned) can at any given moment verify an action taking place? sort of like Condition, Action. Without the correct condition and the action only takes place, then that may or may not raise alarms?
I hope to find out if this is possible, I certainly don't want to get involved in something that may of just made me waste 50$.
Thank You for Any Posts In Regards to This....Tysapha
Anywho I have a few questions regarding the use of this technique. Varying from, safety, to whats actually taking place. I have read over many of the current posts defining how its done, and in a sense, what is taking place. Well let me get started on the questions...
1) In the aspect of taking packets and sending them back and fourth, I noticed that certain "codes" define the given action, and I was wondering, is the actual code like a command? you know for example
XX[yyyyyyyyyy] = Drop this or do this, or something of the sort?
2) When using this technique is it possible for the "warden(s)" to scan your game and simply verify that what is taking place is actually legit? Example:
I kill monster, he drops something I like, I find the packet(s) that is implementing this action, and repeat it, warden does a sort of drive by scan, notices that it would be impossible (or nearly) for 2 of the exact same drops to take place (not to mention the possibility of the items having the same exact ID tag), warden verifies that I didn't actually kill the monster, and closes my account.
It was something I was greatly considering could take place, more so the second question then the first, cause it wouldn't surprise me if the security measurements implemented (I may be a little misconceived as far as that is concerned) can at any given moment verify an action taking place? sort of like Condition, Action. Without the correct condition and the action only takes place, then that may or may not raise alarms?
I hope to find out if this is possible, I certainly don't want to get involved in something that may of just made me waste 50$.
Thank You for Any Posts In Regards to This....Tysapha