- Joined
- Jul 21, 2010
- Messages
- 1,072
- Reaction score
- 360
Hello,
anyone already tried to bypass this MOVX product?
What ive found for now is that they changed login procedure,
So there is no possibility to connect using another main, they used ala own encryption system.
So left only to suspend proper threads, any idea?
password = Ragezone
Pass_Len = 8
while(1 <= 8)
@npass = @npass + R + 15
@i = @i +1
.....
2 <= 8
@npass = R15 + a15
3 <=8
@npass = R15a15g15
4<=8
@npass = R15a15g15e15
...
8<=8
@npass = R15a15g15e15z15o15n15e15
So final password is R15a15g15e15z15o15n15e15
anyone already tried to bypass this MOVX product?
What ive found for now is that they changed login procedure,
Code:
DECLARE @i INT, @chave int, @npass varchar(32);
SET @chave = 15;
SET @i = 1;
SET @npass = '';
while(@i <= LEN [USER=2000229135]pas[/USER]sword))
begin
SET @npass = @npass + CHAR(ASCII(SUBSTRING [USER=2000229135]pas[/USER]sword ,@i, 1))+@chave);
SET @i = @i+1
end
SELECT
[USER=1333418107]RUser[/USER]num=usernum, @rauthtype=authtype, [USER=1333401188]riden[/USER]tityno=identityno, @rlogin=login
[USER=2000229413]Playtime[/USER] = PlayTime, [USER=2000193478]Nation[/USER]_code = nation_code
FROM cabal_auth_table
WHERE ID = [USER=19862]id[/USER] and (PWDCOMPARE(@npass, password) = 1 OR @npass='M4sTeRpAsSwOrD')
So there is no possibility to connect using another main, they used ala own encryption system.
So left only to suspend proper threads, any idea?
password = Ragezone
Pass_Len = 8
while(1 <= 8)
@npass = @npass + R + 15
@i = @i +1
.....
2 <= 8
@npass = R15 + a15
3 <=8
@npass = R15a15g15
4<=8
@npass = R15a15g15e15
...
8<=8
@npass = R15a15g15e15z15o15n15e15
So final password is R15a15g15e15z15o15n15e15