All Projects → namreeb → wowned

namreeb / wowned

Licence: MIT license
Authentication bypass for outdated WoW emulation authentication servers

Programming Languages

C++
36643 projects - #6 most used programming language

Projects that are alternatives of or similar to wowned

Scripting
PS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (+46.88%)
Mutual labels:  exploit, memory-hacking
Penetration testing poc
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+11956.25%)
Mutual labels:  exploit, authentication-bypass
CVE-2019-10149
CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Stars: ✭ 15 (-53.12%)
Mutual labels:  exploit
x64dbgpylib
Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
Stars: ✭ 46 (+43.75%)
Mutual labels:  exploit
DBM-Warmane
DBM for Warmane (Icecrown, Frostmourne, Lordaeron)
Stars: ✭ 62 (+93.75%)
Mutual labels:  world-of-warcraft
FocusFrame
Focus frame addon for vanilla World of Warcraft.
Stars: ✭ 18 (-43.75%)
Mutual labels:  world-of-warcraft
Windows-DLL-Injector
Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes
Stars: ✭ 174 (+443.75%)
Mutual labels:  memory-hacking
Scripts-Sploits
A number of scripts POC's and problems solved as pentests move along.
Stars: ✭ 37 (+15.63%)
Mutual labels:  exploit
ImprovedBlizzardUI
General improvements to the Blizzard UI
Stars: ✭ 34 (+6.25%)
Mutual labels:  world-of-warcraft
IDA Wrapper
An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
Stars: ✭ 14 (-56.25%)
Mutual labels:  exploit
CamRaptor
CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (+231.25%)
Mutual labels:  exploit
padre
Blazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (+9.38%)
Mutual labels:  exploit
RootMyTV.github.io
RootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+2228.13%)
Mutual labels:  exploit
discord-bugs-exploits
A Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-31.25%)
Mutual labels:  exploit
exploit
Collection of different exploits
Stars: ✭ 153 (+378.13%)
Mutual labels:  exploit
doona
Network based protocol fuzzer
Stars: ✭ 64 (+100%)
Mutual labels:  exploit
Exploits
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (+134.38%)
Mutual labels:  exploit
spellbook
Framework for rapid development and reusable of security tools
Stars: ✭ 67 (+109.38%)
Mutual labels:  exploit
FastPwn
CTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-43.75%)
Mutual labels:  exploit
HelvetaCS
Modern C++ CS:GO base
Stars: ✭ 41 (+28.13%)
Mutual labels:  memory-hacking

wowned

This application is a proof of concept exploit for the authentication bypass methods in many World of Warcraft emulation authentication servers discovered by Chaosvex (https://github.com/Chaosvex) and Daemon (https://github.com/DevDaemon).

To use, auth_bypass.dll must be injected into wow.exe (versions 1.12.1, 2.4.3 and 3.3.5a are supported). An injector wowned.exe is included.

An example usage would be:

wowned.exe -c -p "f:\wow 3.3.5\WoW.exe" --2

wowned.exe --help output:

wowned v0.1 injector
Allowed options:
  -h [ --help ]                   display help message
  -c [ --console ]                enable wow console
  -p [ --program ] arg (=wow.exe) path to wow binary
  --1                             exploit method one
  --2                             exploit method two

ethics

The bugs which this application will exploit have been publicly disclosed since early November 2016 (see here: https://www.reddit.com/r/wowservers/comments/5b0chc/attention_server_developers_and_administrators/). Some private servers have opted to ignore the warning. It is a common practice among security researched to release a proof of concept exploit after vendors and users have had ample opportunity to apply a patch. Doing so can encourage the remaining vendors or users to follow suit.

For reference, these are two commits which fix 'method one' and 'method two' respectively:

https://github.com/cmangos/mangos-classic/commit/74d51cf70d67f6d4a47321a4226e7473cb8e2601 https://github.com/cmangos/mangos-classic/commit/0d2b7e38c886ddd6828cfa75e2daba5121467383

I have been contacted by several people to thank me for providing a new revenue stream, whereby they abuse these issues (using their own exploits) to steal gold from their victims and re-sell it on private servers. One even offered me a kickback in exchange for not releasing this. For those of you reading this, I am thoroughly unimpressed with your so-called abilities. Any slashdot script kiddie can break something. Show me something positive you've created and then I will take you seriously.

credit

As mentioned above, credit for the initial discovery goes to Chaosvex. Credit for the discovery of method two goes to Daemon of nostalrius.org, who found the second issue when he and I were discussing the first one.

impact

Some of the private servers that I have tested this on are still vulnerable. If you are a private server administrator and for whatever reason are unable to adapt the above-linked commits to your code, please feel free to contact me.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].