![]() |
|
![]() |
|
Thread Tools | Display Modes |
#41
|
||||
|
![]() Quote:
It usually involves more than just swapping out a DLL. It's easiest to have an executable that can do the injection (see bullet point #3 in the wiki for how-to). Once you can get another process to load your DLL, then your DLL main function will be called. This is where the process that's being injected into loses all control, and this is precisely why a detection mechanism for cheating would target foreign DLLs. An attacker can have all kinds of fun in here since they are executing in the other process' address space. So, rough sketch of how P1999 staff could theoretically make your EQClient grab data from your web browser: 1) Inject a DLL into EQClient through the launcher. 2) Now the DLL main function will get called by EQClient. They put the code for DLL injection into the DLL that's being injected though! So now this DLL main will make EQClient inject the very same DLL into your web browser. If you are feeling fancy (or kinky) you could do something like hooking the function for receiving tells and trigger this to happen only when "gay elf love" is contained in the text. 3) The same thing happens inside the web browser except it starts snapping screenshots. Hide yo kids, hide yo wife. The claim that it's possible is not full of shit.. I wouldn't miss any sleep over worrying about it though. PS: I see you've worked out more of this while I wrote this post. Cool. Gonna post it anyway in case you find something interesting. | |||
|
#42
|
|||||
|
![]() Quote:
Quote:
I had a feeling that there was some way to include malicious code in the dll file but I thought that it would also require specific conditions with the executable loading it, as well. Is it possible to know whether or not the EQClient can be used this way? Does the swapped dll file alter the executable file to inject code in this way, and how could it access other programs if the access permissions to do so were not originally granted to the executable loading the dll file?
__________________
Dinobots
| ||||
|
#43
|
|||||
|
![]() Quote:
__________________
Quote:
| ||||
|
#44
|
||||
|
![]() Quote:
__________________
Dinobots
| |||
|
#45
|
|||
|
![]() this explains why my bank account is low and i got that fixit ticket for expired registration the other week and i may have a drinking problem
illuminati everywhere damnit rogean. glad to have someone reveal the TRUTH for all to see | ||
|
#46
|
|||||
|
![]() Quote:
If window says "MQ2" (or whatever), send "OH SHIT" to Rogean. Else: do nothing
__________________
Quote:
| ||||
|
#47
|
||||
|
![]() Quote:
If: web browser says "cuckhold", send site login information to Rogean. Else: send bank account info and install ransomware.
__________________
Dinobots
| |||
|
#48
|
|||
|
![]() i heard the virgin detector they put in the client crashed the internet for 30 minuets.
| ||
|
#49
|
|||||
|
![]() Quote:
__________________
Quote:
| ||||
|
![]() |
|
|