Seems like @BurakDev should get us updated with his latest findings, wink wink
Seems like @BurakDev should get us updated with his latest findings, wink wink
I have some clues that make me thinks that the same exploit used on the first release of NovoFatum works on beta version.
Let's me explain my clues, and how I implemented it on the first release of NovoFatum. Let's start with the first version of NovoFatum:
- The first release of NovoFatum took advantage of an error in the client, which did not check if the handshake had not been initiated.
- So, I implemented on NovoFatum all the handshake for comunicating with the server, and then I started the client with non-encrypted packets after handshaking in my side.
I think that could work in the beta release because I made some tests, and I received a ping packet without any encryption after waiting for a long time without sending anything.
We got a fully functional packetlogger/client patcher/cracked client but better to wait an improved version of Habbo2020.
@LittleJ nice idea, didn't tested this. It's vulnerable to ljmath0 anyway. It seems they did all crypto mistakes from flash.
does anyone have mirrors to this? I want to give it a go
does anyone already have access to habbo beta here in the original ragezone?
Yes, this is the current release:
https://images.habbo.com/habbo-webgl...obal-prod.json
They will under the terms of the GNU GPL once the client is public and not total trash. ;) Forcing all new emulator derivatives in any language (cause the license is that toxic and affects translating code to a new language) to be under the GNU GPL. I think people aren't sharing what they've found for reasons I wont name though. If you're a decent community contributor you have no issue getting access to the information.