43 mesaje
  • Mesaje: 5
  • Reacții: 2
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Regat: Shinsoo
  • Medalii

    salexandru9982 scrie: POZA SI CU FREEBSD DIN ARHIVA CA SA NU ZICETI CA NU EXISTA
    Cauta pe google Official Client Locale String metin2 si il instalezi ca sa citeasca cu stringurile din client etc.

    🔥 Hai pe Discord! - Chat activ și support direct

    Te așteptăm și pe serverul de Discord - aici ne-am strâns toată comunitatea de Metin2 din România.

    Alătură-te acum!
    1300+ de membri activi!
    Robot Discord
    Roboțelu'
    Anunț
  • Mesaje: 9
  • Reacții: 5
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Server: NexusII
  • Regat: Jinno
  • [ID Discord]
  • Contact:

    Medalii

    Mesaj de SH4FT »

    ============================================================================
    VULNERABILITY #3: ITEM COUNT DUPLICATION
    ============================================================================
    Severity: 🔴 CRITICAL
    Type: Logic Bug / Game Exploit
    CVSS Score: 8.2 (High) - Economic damage
    Impact: Item Duplication, Economy Destruction, Revenue Loss

    Location:
    File: game/src/item.cpp
    Functions: SetCount(), RemoveFromCharacter()
    Lines: 237-288

    Description:
    ────────────
    The SetCount() function validates item count using MIN() but does NOT validate
    input before processing. Combined with item destruction logic triggered on
    count=0, this allows duplication.

    Vulnerable Code:
    bool CItem::SetCount(DWORD count)
    {
    // Only applies MIN, no validation!
    if (GetType() == ITEM_ELK)
    m_dwCount = MIN(count, INT_MAX);
    else
    m_dwCount = MIN(count, g_bItemCountLimit);

    // If count becomes 0, destruction logic triggers
    if (count == 0 && m_pOwner)
    {
    // Item is destroyed
    M2_DESTROY_ITEM(this);
    }

    UpdatePacket();
    Save();
    return true;
    }

    Attack Scenario - Race Condition:
    ─────────────────────────────────
    Timeline:
    1. T0: Player has 1x Rare Item
    2. T1: Player sends ItemMove packet: count=1, from inventory to ground
    3. T2: Server calls SetCount(1) - valid operation
    4. T3: Player rapidly sends ItemMove packet: count=0 (drop item)
    5. T4: Server begins destruction (M2_DESTROY_ITEM)
    6. T5: Simultaneously, another packet handler calls SetCount(1) on same item
    7. T6: Race condition: both destruction and update try to modify m_dwCount
    8. T7: Item persists on ground AND in inventory
    9. RESULT: Item duplicated!

    Technical Details:
    ──────────────────
    Root Causes:
    1. No atomic operations on m_dwCount
    2. No mutex/lock protection
    3. No transaction handling
    4. Destruction can be triggered mid-update

    Attack Code (conceptual):
    ────────────────────────
    // In game client, send packets rapidly:
    for (int i = 0; i < 1000; i++)
    {
    // Send: Move item to ground
    ItemMove(item, ground_pos);

    // Send: Set count to 0 (drop)
    SetItemCount(item, 0);

    // Send: Move item again
    ItemMove(item, inventory_pos);

    // Race condition window where item exists in both places
    }

    Game Economy Impact:
    ────────────────────
    Scenario:
    - Rare item drops value 100,000,000 gold
    - Item duplicated 100 times via exploit
    - 10,000,000,000 gold of items flooded market
    - Item value crashes to 1,000,000
    - Legitimate players lose 990,000,000 per item (99% loss)

    Real-World Examples:
    ────────────────────
    1. World of Warcraft had similar exploit (Diablo cloning)
    2. RuneScape had duplication bugs causing rollbacks
    3. Final Fantasy XIV had item duplication (forced server maintenance)
    4. Metin2 servers have had duplication exploits historically

    Detection Methods:
    ──────────────────
    1. Database audit: check for impossible item combinations
    2. Player statistics: sudden wealth increase
    3. Item usage: rare items appearing on many accounts
    4. Price monitoring: sudden price crashes

    Proof:
    ──────
    To verify vulnerability exists:
    1. Create test account with 1x Rare Item
    2. Send ItemMove + SetItemCount(0) rapidly in parallel
    3. Observe item appearing in multiple places
    4. Item duplicated

    Database Evidence:
    ──────────────────
    SELECT player_id, item_vnum, COUNT(*) as count
    FROM player_items
    WHERE item_vnum = 'RARE_ITEM'
    GROUP BY player_id
    HAVING count > legitimate_max;

    -- Shows accounts with impossible item duplicates

    Attack Tools Available:
    ────────────────────────
    - Packet sniffer/modifier (WinPcap, Wireshark)
    - Macro recorder (AutoIt, Python bot)
    - Parallel request sender
    - Race condition timing tools

    Similar Vulnerabilities:
    ────────────────────────
    - Exchange system (simultaneous trade cancel?)
    - Drop/pickup (rapid drop+pickup?)
    - Item selling (sell+cancel race?)


    Sa fie adevarat ? :-? :-? :-?
  • Mesaje: 9
  • Reacții: 5
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Server: NexusII
  • Regat: Jinno
  • [ID Discord]
  • Contact:

    Medalii

    Mesaj de SH4FT »

    AUDIT SUMMARY

    Total Files Scanned: 441 C/C++ source files
    Critical Vulnerabilities Found: 47+
    High Severity Issues: 38+
    Medium Severity Issues: 52+


    🚨 CRITICAL FINDINGS

    Remote Code Execution: 6+ ways to achieve it
    • Buffer overflow via database
    • Buffer overflow via config file
    • SQL injection for privilege escalation

    Data Theft: 8+ attack vectors
    • SQL injection for full database dump
    • Direct account access without auth
    • Password cracking (plaintext storage)

    Privilege Escalation: 4+ ways
    • Become GM/admin via SQL injection
    • Root access via config file overflow
    • Bypass ownership checks

    Denial of Service: 5+ vectors
    • Crash via oversized packets
    • Memory exhaustion
    • Database destruction


    :| ...
  • Mesaje: 78
  • Reacții: 51
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Regat: Shinsoo
  • Medalii

    Mesaj de DEVE »

    SH4FT scrie: AUDIT SUMMARY

    Total Files Scanned: 441 C/C++ source files
    Critical Vulnerabilities Found: 47+
    High Severity Issues: 38+
    Medium Severity Issues: 52+


    🚨 CRITICAL FINDINGS

    Remote Code Execution: 6+ ways to achieve it
    • Buffer overflow via database
    • Buffer overflow via config file
    • SQL injection for privilege escalation

    Data Theft: 8+ attack vectors
    • SQL injection for full database dump
    • Direct account access without auth
    • Password cracking (plaintext storage)

    Privilege Escalation: 4+ ways
    • Become GM/admin via SQL injection
    • Root access via config file overflow
    • Bypass ownership checks

    Denial of Service: 5+ vectors
    • Crash via oversized packets
    • Memory exhaustion
    • Database destruction


    :| ...
    De unde postezi auditurile astea? Sunt atatea servere facute pe marty da nu am vazut vreunu sau vreun dev sa posteze asta. Daca e doar un scan cu un soft e un rahat.
    Moderator Moderator
  • Mesaje: 533
  • Reacții: 6289
  • Mesaje utile: 20
  • Status: 🚀I'm gonna change the future!
  • Server: Nethis & Thoth
  • Regat: Chunjo
  • [ID Discord]
  • Contact:

    Medalii

    Avatar utilizator
    Moderator
    Moderator

    Mesaj de Andi »

    SH4FT scrie:
    ============================================================================
    VULNERABILITY #3: ITEM COUNT DUPLICATION
    ============================================================================
    Severity: 🔴 CRITICAL
    Type: Logic Bug / Game Exploit
    CVSS Score: 8.2 (High) - Economic damage
    Impact: Item Duplication, Economy Destruction, Revenue Loss

    Location:
    File: game/src/item.cpp
    Functions: SetCount(), RemoveFromCharacter()
    Lines: 237-288

    Description:
    ────────────
    The SetCount() function validates item count using MIN() but does NOT validate
    input before processing. Combined with item destruction logic triggered on
    count=0, this allows duplication.

    Vulnerable Code:
    bool CItem::SetCount(DWORD count)
    {
    // Only applies MIN, no validation!
    if (GetType() == ITEM_ELK)
    m_dwCount = MIN(count, INT_MAX);
    else
    m_dwCount = MIN(count, g_bItemCountLimit);

    // If count becomes 0, destruction logic triggers
    if (count == 0 && m_pOwner)
    {
    // Item is destroyed
    M2_DESTROY_ITEM(this);
    }

    UpdatePacket();
    Save();
    return true;
    }

    Attack Scenario - Race Condition:
    ─────────────────────────────────
    Timeline:
    1. T0: Player has 1x Rare Item
    2. T1: Player sends ItemMove packet: count=1, from inventory to ground
    3. T2: Server calls SetCount(1) - valid operation
    4. T3: Player rapidly sends ItemMove packet: count=0 (drop item)
    5. T4: Server begins destruction (M2_DESTROY_ITEM)
    6. T5: Simultaneously, another packet handler calls SetCount(1) on same item
    7. T6: Race condition: both destruction and update try to modify m_dwCount
    8. T7: Item persists on ground AND in inventory
    9. RESULT: Item duplicated!

    Technical Details:
    ──────────────────
    Root Causes:
    1. No atomic operations on m_dwCount
    2. No mutex/lock protection
    3. No transaction handling
    4. Destruction can be triggered mid-update

    Attack Code (conceptual):
    ────────────────────────
    // In game client, send packets rapidly:
    for (int i = 0; i < 1000; i++)
    {
    // Send: Move item to ground
    ItemMove(item, ground_pos);

    // Send: Set count to 0 (drop)
    SetItemCount(item, 0);

    // Send: Move item again
    ItemMove(item, inventory_pos);

    // Race condition window where item exists in both places
    }

    Game Economy Impact:
    ────────────────────
    Scenario:
    - Rare item drops value 100,000,000 gold
    - Item duplicated 100 times via exploit
    - 10,000,000,000 gold of items flooded market
    - Item value crashes to 1,000,000
    - Legitimate players lose 990,000,000 per item (99% loss)

    Real-World Examples:
    ────────────────────
    1. World of Warcraft had similar exploit (Diablo cloning)
    2. RuneScape had duplication bugs causing rollbacks
    3. Final Fantasy XIV had item duplication (forced server maintenance)
    4. Metin2 servers have had duplication exploits historically

    Detection Methods:
    ──────────────────
    1. Database audit: check for impossible item combinations
    2. Player statistics: sudden wealth increase
    3. Item usage: rare items appearing on many accounts
    4. Price monitoring: sudden price crashes

    Proof:
    ──────
    To verify vulnerability exists:
    1. Create test account with 1x Rare Item
    2. Send ItemMove + SetItemCount(0) rapidly in parallel
    3. Observe item appearing in multiple places
    4. Item duplicated

    Database Evidence:
    ──────────────────
    SELECT player_id, item_vnum, COUNT(*) as count
    FROM player_items
    WHERE item_vnum = 'RARE_ITEM'
    GROUP BY player_id
    HAVING count > legitimate_max;

    -- Shows accounts with impossible item duplicates

    Attack Tools Available:
    ────────────────────────
    - Packet sniffer/modifier (WinPcap, Wireshark)
    - Macro recorder (AutoIt, Python bot)
    - Parallel request sender
    - Race condition timing tools

    Similar Vulnerabilities:
    ────────────────────────
    - Exchange system (simultaneous trade cancel?)
    - Drop/pickup (rapid drop+pickup?)
    - Item selling (sell+cancel race?)


    Sa fie adevarat ? :-? :-? :-?
    De ce ai generat aceste audituri false :-w


    See full signature
    Moderator Moderator
  • Mesaje: 533
  • Reacții: 6289
  • Mesaje utile: 20
  • Status: 🚀I'm gonna change the future!
  • Server: Nethis & Thoth
  • Regat: Chunjo
  • [ID Discord]
  • Contact:

    Medalii

    Avatar utilizator
    Moderator
    Moderator

    Mesaj de Andi »

    SH4FT scrie: AUDIT SUMMARY

    Total Files Scanned: 441 C/C++ source files
    Critical Vulnerabilities Found: 47+
    High Severity Issues: 38+
    Medium Severity Issues: 52+


    🚨 CRITICAL FINDINGS

    Remote Code Execution: 6+ ways to achieve it
    • Buffer overflow via database
    • Buffer overflow via config file
    • SQL injection for privilege escalation

    Data Theft: 8+ attack vectors
    • SQL injection for full database dump
    • Direct account access without auth
    • Password cracking (plaintext storage)

    Privilege Escalation: 4+ ways
    • Become GM/admin via SQL injection
    • Root access via config file overflow
    • Bypass ownership checks

    Denial of Service: 5+ vectors
    • Crash via oversized packets
    • Memory exhaustion
    • Database destruction


    :| ...
    Nu mai genera informații false [-x


    See full signature
  • Mesaje: 9
  • Reacții: 5
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Server: NexusII
  • Regat: Jinno
  • [ID Discord]
  • Contact:

    Medalii

    Mesaj de SH4FT »

    nu va suparati asa tare fratilor, ca nam taiat capul la nimeni! suntem aici sa discutam si sa dezbatem lucrurile astea! gen aici:

    BUFFER OVERFLOW VULNERABILITIES

    ### 1.1 strcpy() without Bounds Checking

    **Location:** `db/clientmanager.cpp`, line 430
    **Severity:** CRITICAL - Stack Buffer Overflow
    **Exploitability:** High - Remote attacker can crash server or achieve RCE

    #### Vulnerable Code:
    ```cpp
    // Line 430 - VULNERABLE
    strcpy(login_data, client_input); // No bounds checking
    ```

    #### Problem Explanation:
    - `login_data` is likely a fixed-size buffer (typically 32-64 bytes)
    - `client_input` comes from network packet with no size validation
    - Attacker can send packets with 1000+ bytes to overflow the stack
    - Overwritten return address allows arbitrary code execution
  • Mesaje: 78
  • Reacții: 51
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Regat: Shinsoo
  • Medalii

    Mesaj de DEVE »

    SH4FT scrie: nu va suparati asa tare fratilor, ca nam taiat capul la nimeni! suntem aici sa discutam si sa dezbatem lucrurile astea! gen aici:

    BUFFER OVERFLOW VULNERABILITIES

    ### 1.1 strcpy() without Bounds Checking

    **Location:** `db/clientmanager.cpp`, line 430
    **Severity:** CRITICAL - Stack Buffer Overflow
    **Exploitability:** High - Remote attacker can crash server or achieve RCE

    #### Vulnerable Code:
    ```cpp
    // Line 430 - VULNERABLE
    strcpy(login_data, client_input); // No bounds checking
    ```

    #### Problem Explanation:
    - `login_data` is likely a fixed-size buffer (typically 32-64 bytes)
    - `client_input` comes from network packet with no size validation
    - Attacker can send packets with 1000+ bytes to overflow the stack
    - Overwritten return address allows arbitrary code execution
    Chatgpt? Sau cu ce anume realizezi aceste audituri?
    Moderator Moderator
  • Mesaje: 533
  • Reacții: 6289
  • Mesaje utile: 20
  • Status: 🚀I'm gonna change the future!
  • Server: Nethis & Thoth
  • Regat: Chunjo
  • [ID Discord]
  • Contact:

    Medalii

    Avatar utilizator
    Moderator
    Moderator

    Mesaj de Andi »

    SH4FT scrie: nu va suparati asa tare fratilor, ca nam taiat capul la nimeni! suntem aici sa discutam si sa dezbatem lucrurile astea! gen aici:

    BUFFER OVERFLOW VULNERABILITIES

    ### 1.1 strcpy() without Bounds Checking

    **Location:** `db/clientmanager.cpp`, line 430
    **Severity:** CRITICAL - Stack Buffer Overflow
    **Exploitability:** High - Remote attacker can crash server or achieve RCE

    #### Vulnerable Code:
    ```cpp
    // Line 430 - VULNERABLE
    strcpy(login_data, client_input); // No bounds checking
    ```

    #### Problem Explanation:
    - `login_data` is likely a fixed-size buffer (typically 32-64 bytes)
    - `client_input` comes from network packet with no size validation
    - Attacker can send packets with 1000+ bytes to overflow the stack
    - Overwritten return address allows arbitrary code execution
    Lipsa de ocupație :-t


    See full signature
  • Mesaje: 9
  • Reacții: 5
  • Mesaje utile: 0
  • Status: Pierd vremea ^.^
  • Server: NexusII
  • Regat: Jinno
  • [ID Discord]
  • Contact:

    Medalii

    Mesaj de SH4FT »

    nu mai conteaza, scuze daca sunteti asa deranjati de ceea ce gaseste un om de 41 de ani, developer in c++ de vreo 15 .. in fisierele lui THE GOD Marty :| scuzati din nou

    🔥 Hai pe Discord! - Chat activ și support direct

    Te așteptăm și pe serverul de Discord - aici ne-am strâns toată comunitatea de Metin2 din România.

    Alătură-te acum!
    1300+ de membri activi!
    Robot Discord
    Roboțelu'
    Anunț
    Scrie răspuns

    Creează-ți un cont sau autentifică-te pentru a participa la discuție

    Trebuie să fii membru pentru a răspunde

    Creează-ți un cont

    Membrii pot crea subiecte noi și pot descărca resurse Metin2 Gratuit!


    Te poți înregistra sau conecta rapid utilizând contul tău de Discord, Github sau Google.

    Înregistrare

    Autentifică-te

    Înapoi la “Serverfiles Stabile”

    Informații

    Utilizatori ce navighează pe acest forum: anhur3709, Anubis2Oficial, DEVE, Hound, lovereka, MDShved, realashkari și 3 vizitatori

    Discord ID copiat: