April 10, 2021, 05:02:10 PM

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - sit0

Pages: [1] 2
1
Download / Enigma 0.994
« on: June 19, 2011, 03:31:09 AM »
Enigma 0.994 || by -=^$iT()^=- (BETA)

http://darkblizz.org/Forum2/downloads/?sa=downfile&id=33

[hs width=300 height=300]http://darkblizz.org/sit0/Enigma/enigma.png[/hs]

FULL SOURCE CODE NOW INCLUDED IN ZIP FILE

:: Added support for
---- DIablo Shareware Diablo 1, Diablo 2
---- Starcraft Shareware

:: Warcraft 3, Warcraft 3XP, Diablo 2 XP is not supported still...

2
Download / Enigma 0.993
« on: June 05, 2011, 05:15:12 PM »
Enigma 0.993 || by -=^$iT()^=- (BETA)

http://darkblizz.org/Forum2/downloads/?sa=downfile&id=33

[hs width=300 height=300]http://darkblizz.org/sit0/Enigma/enigma.png[/hs]

FULL SOURCE CODE NOW INCLUDED IN ZIP FILE

:: Added New Commands, check Mandate.cpp
:: Added Master User
:: Added support to 0x19, 0x26
:: Fixed AutoJoin/Delay on Connection to Server

3
Download / Enigma 0.992
« on: January 09, 2011, 01:11:02 PM »
Enigma 0.992 || by -=^$iT()^=- (BETA)

http://darkblizz.org/Forum2/downloads/?sa=downfile&id=33

[hs width=300 height=300]http://darkblizz.org/sit0/Enigma/enigma.png[/hs]

:: Fixed everything, I believe...
:: Haven't enabled diablo 2 or warcraft 3 login yet, as well as support on windows. (will do so in the future)

4
Suggestions / bot.h
« on: January 09, 2011, 12:31:28 PM »
Code: [Select]
#include <stdio.h>

#include <stdlib.h>

#include <unistd.h> //close() socket

#include <string.h>

#include <ctype.h> //isprint()

#include <stdarg.h> //send va_ function

#include <stdint.h> //INT32 16 8...

//#include <sys/timeb.h> //gettickcount alternative

#include <time.h>



#ifdef _WIN32 //SOCKET

#include <winsock2.h>

#include <winsock.h>

#include <windows.h>

#else

#include <sys/socket.h>

#include <sys/types.h>

#include <netinet/in.h>

#include <netdb.h>

#include <arpa/inet.h> //inet_addr()

#endif



/*

PATH_MAX (defined in limits.h)

FILENAME_MAX (defined in stdio.h)

both of these are set to 4096 on my system (x86 Linux).



typedef unsigned char BYTE;

typedef unsigned long DWORD;

typedef long long LONGLONG;

typedef int LONG;

typedef unsigned short WORD;



typedef unsigned char* PBYTE;

typedef unsigned long* PDWORD;

typedef long long* PLONGLONG;

typedef int* PLONG;

typedef void* LPVOID;

typedef unsigned short* PWORD;

*/



extern int SB;



#ifndef BOT_H

#define BOT_H



#include "thread.h"



class Bot : public thread

{

public:

bool spingbb;



static char LDFile0[FILENAME_MAX];

static char D2File[4][FILENAME_MAX];

static char SCFile[4][FILENAME_MAX];

static char W2File[4][FILENAME_MAX];

static char W3File[4][FILENAME_MAX];

static char Language[11];

static char ACountry[11];

static char Country[31];

static int D2Byte;

static int SCByte;

static int W2Byte;

static int W3Byte;

static char BPlug[5];

static int SPing;

static bool Ping0;

static bool Ping1;

static bool Dump;

static bool Auto;

static char CMD[255];



static void getVAR(int num, char buf[]);



#ifdef _WIN32

WSADATA wsaData;

sockaddr_in h;

SOCKET sock;

#else

int sock;

#endif



char VFile[4][FILENAME_MAX];

char Username[255];

char Password[255];

char Server[255];

char Channel[255];

char CDKey[27];

char Client[9];



int VByte;

int Delay;



bool Connected;





char strname[255];



int ClientToken;

int ServerToken;

int place, PSB, CLIST;



char buff[2048];

unsigned int buflen;



Bot();



void SOCK_CON();

void SOCK_DISCON();

bool SOCK_CREATE();

void SOCK_HANDLER();





void run();

void readconsoleshit();

void getinput(char* blah);

void Login();

void hex_print(char* , int length);

void hexdump(char *pAddressIn, int le);

int Send(char *szFmt, ...);



void Mandate(char* a, char s[], bool d);

void Mandate2(int n, char* a, char* s, bool d);





void BVDispatch(char *user, char *txt, unsigned long VAR[]);

void CDispatch(char *);

void CVDispatch(char *pszEvent, int pnEventId, char *pszSpeaker, unsigned long puFlags, char *pszEventText);

void EID_HANDLER(char *pszEvent, int *pnEventId, char *pszSpeaker, unsigned  long *puFlags, char *pszEventText);

void EID_USER(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_JOIN(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_FLAG(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_LEFT(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_TALK(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_CHAN(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_PMSG(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_INFO(char *szSpeaker, unsigned long uFlags, char *szEventText);

void EID_NAME(char *szSpeaker, unsigned long uFlags, char *szEventText);





void RP_TEXT(unsigned char PID,char *szFmt, ...);

void RP_HANDLER(unsigned char PID, char *DATA, short DATALEN);

void RP_0x09(char *DATA, short DATALEN);

void RP_0x0A(char *data);

void RP_0x0B(char *data);

void RP_0x0F(char *data);

void RP_0x25(char *data);

void RP_0x3A(char *data);

void RP_0x3D(char *data);

void RP_0x46(char *data);

void RP_0x50(char *data);

void RP_0x51(char *data);

void SP_0x00();

void SP_0x09();

void SP_0x0A();

void SP_0x0B();

void SP_0x0C(int ss,char *data);

void SP_0x0E(char *data);

void SP_0x14();

void SP_0x25(char *data);

void SP_0x3A();

void SP_0x3D();

void SP_0x46();

void SP_0x50();

void SP_0x51(char *KeyHash, char *exeInfo, unsigned long exeVersion, unsigned long Checksum, unsigned long, unsigned long);





void ABYTE(unsigned char data);

void AWORD(unsigned short data);

void ADWORD(unsigned long data);

void ASTRING0(char* data);

void ASTRING(char* data);

void AVOID(void* data, unsigned int len);

void APACKET(unsigned char PacketID);

void APACKET0(char *lpszFmt, ...);

};



#endif

5
Suggestions / buffer.cpp
« on: January 09, 2011, 12:30:39 PM »
Code: [Select]
#include "bot.h"

void Bot::ABYTE(unsigned char data)
{
*(buff + buflen) = data;
buflen++;
}

void Bot::AWORD(unsigned short data)
{
*(unsigned short *)(buff + buflen) = data;
buflen += 2;
}

void Bot::ADWORD(unsigned long data)
{
*(unsigned long *)(buff + buflen) = data;
buflen += 4;
}

void Bot::ASTRING(char* data)
{
strcpy(buff + buflen, data);
buflen += strlen(data);
}

void Bot::ASTRING0(char* data)
{
ASTRING(data);
ABYTE(0);
}

void Bot::AVOID(void* data, unsigned int len)
{
memcpy(buff + buflen, data, (size_t)len);
buflen += len;
}

void Bot::APACKET(unsigned char PID)
{
buff[1] = PID;
*(unsigned short *)(buff + 2) = buflen;
send(sock, buff, buflen, 0);

if((PSB == SB) && (Dump==true))
hexdump(buff,buflen);

buflen = 4;
}

void Bot::APACKET0(char *Data, ...)
{
char buf[256];
va_list argptr;

va_start(argptr, Data);
vsprintf(buf, Data, argptr);
va_end(argptr);

if (send(sock, buf, strlen(buf), 0) < 0)
exit(1);
}

6
Suggestions / mandate.cpp
« on: January 09, 2011, 12:28:29 PM »
Code: [Select]
#include "bot.h"

void Bot::Mandate(char* USER, char DATA[], bool CMDED)
{
char cmdvar[255];
char ooo[255];

if(CMDED == true)
DATA=strtok(DATA, "/");
else
DATA=strtok(DATA, CMD);

printf("DATA: %s\n",DATA);

if (DATA == NULL)
{
printf("ERROR NULL COMMAND DATA\n");
return;
}

strcpy(ooo, "/");
strcat(ooo, DATA);

DATA=strtok(DATA, " ");

if (DATA == NULL)
{
printf("ERROR NULL COMMAND CMDVAR\n");
return;
}

printf("cmd: %s\n",DATA);

int x = strcspn(DATA," ");
strcpy(cmdvar, DATA + x+1);

printf("cmdvar: %s\n",cmdvar);

if(!strcmp(DATA,"join"))
Mandate2(00, USER,cmdvar,CMDED);
else if(!strcmp(DATA,"game") )
Mandate2(01, USER,cmdvar,CMDED);
else
{
printf("ooo: %s\n",ooo);
if(!strcmp(Client,"TAHC"))
APACKET0("%s\r\n", ooo);
else
SP_0x0E(ooo);
}

}

void Bot::Mandate2(int num, char* USER, char DATA[], bool CMDED)
{
switch (num)
{
case 00: SP_0x0C(2,DATA); return;
case 01: SP_0x09(); return;
default: break;
}
}

7
Suggestions / packets.cpp
« on: January 09, 2011, 12:27:49 PM »
Code: [Select]
#include "bot.h"

void Bot::RP_TEXT(unsigned char PID, char *DATA, ...)
{
if((PSB == SB))
{
char buf[2048];
va_list argptr;

va_start(argptr, DATA);

vsprintf(buf, DATA, argptr);
printf("|0x%02X| %s", PID, buf); //"|%#02X|" will produce the 0X46

va_end(argptr);
}
}

void Bot::RP_HANDLER(unsigned char PID, char *DATA, short DATALEN)
{
switch (PID)
{
case 0x00: SP_0x00(); break;
case 0x09: RP_0x09(DATA, DATALEN); break;
case 0x0A: RP_0x0A(DATA); break;
case 0x0B: RP_0x0B(DATA); break;
case 0x0F: RP_0x0F(DATA); break;
case 0x25: RP_0x25(DATA); break;
case 0x3A: RP_0x3A(DATA); break;
case 0x3D: RP_0x3D(DATA); break;
case 0x46: RP_0x46(DATA); break;
case 0x50: RP_0x50(DATA); break;
case 0x51: RP_0x51(DATA); break;
//case 0x5E: RP_0x5E(DATA); break;
default: printf("unhandled packet: ");if(Dump==false) hexdump(DATA,DATALEN); break;
}
}

void Bot::SP_0x00()
{
APACKET(0x00);
}

void Bot::RP_0x09(char *DATA, short DATALEN)
{
if(Dump==false) {hexdump(DATA,DATALEN);}
unsigned long sum,status;

unsigned short gametype[30];
unsigned short paramet[30];//?
unsigned long langid[30];
unsigned short ipfamily[30];//af_inet
unsigned short ipport[30];
unsigned long iphost[30];
unsigned long ipsinzero1[30];
unsigned long ipsinzero2[30];
unsigned long gamestatus[30];
unsigned long gameelapsedtime[30];
char *gamename;
char *gamepass;
char *gamestat;

sum = ( *(unsigned long *)(DATA + 4) );
printf("\nthe amount of games listed %lu\n",sum);

if(sum==0)
{
status = ( *(unsigned long *)(DATA + 8) );
printf("status of recieved 0x09 packet %lu\n",status);

switch(status)
{
case 0: printf("ok\n"); break;
case 1: printf("game doesnt exist\n"); break;
case 2: printf("incorrect password\n"); break;
case 3: printf("game full\n"); break;
case 4: printf("game already started\n");break;
case 6: printf("too many server requests\n"); break;
default:printf("no idea what when wrong\n"); break;
}
}
else
{
int prevpacket=0;

DATA= DATA+ 8;

for (int b=0; b < sum; b++)
{
gametype[b] = ( *(unsigned short *)(DATA + prevpacket) );
printf("gametype: %hu\n",gametype[b]);

paramet[b] = ( *(unsigned short *)(DATA + prevpacket + 2) );
printf("paramet: %hu\n",paramet[b]);

langid[b] = ( *(unsigned long *)(DATA + prevpacket + 4 ) );
printf("langid: %lx\n",langid[b]);

ipfamily[b] = ( *(unsigned short *)(DATA + prevpacket + 8) );
printf("ipfamily: %hu\n",ipfamily[b]);

ipport[b] = ( *(unsigned short *)(DATA + prevpacket + 10) );
printf("ipport: %hu\n",ipport[b]);

iphost[b] = ( *(unsigned long *)(DATA + prevpacket + 12 ) );
printf("iphost: %lu\n",iphost[b]);

ipsinzero1[b] = ( *(unsigned long *)(DATA + prevpacket + 16 ) );
printf("ipsinzero1: %lu\n",ipsinzero1[b]);

ipsinzero2[b] = ( *(unsigned long *)(DATA + prevpacket + 20 ) );
printf("ipsinzero2: %lu\n",ipsinzero2[b]);

gamestatus[b] = ( *(unsigned long *)(DATA + prevpacket + 24 ) );
printf("gamestatus: %lu\n",gamestatus[b] );

gameelapsedtime[b] = ( *(unsigned long *)(DATA + prevpacket + 28 ) );
printf("gameelapsedtime: %lu\n",gameelapsedtime[b]);

gamename = DATA + prevpacket + 32;
printf("gamename: %s\n",gamename);

gamepass = DATA + (strlen(gamename)) + prevpacket + 33;
printf("gamepass: %s\n",gamepass);

gamestat = DATA + (strlen(gamename)) + (strlen(gamepass)) + prevpacket + 34;
printf("gamestat: %s\n",gamestat);

prevpacket += (strlen(gamename)) +(strlen(gamepass)) + (strlen(gamestat)) + 35;
}
}
}

void Bot::SP_0x09()
{
AWORD(0x0A);
AWORD(0x0);
ADWORD(0xFFFF);
ADWORD(0);
ADWORD(0x09); //number of game
ASTRING0("");
ASTRING0("");
ASTRING0("");
APACKET(0x09);
}

void Bot::RP_0x0A(char *DATA)
{
if(Connected == false)
Connected = true;

strcpy(strname,DATA+4);
RP_TEXT(DATA[1], "%s",strname );
}

void Bot::SP_0x0A()
{
ASTRING0(Username);
ABYTE(0x00);
APACKET(0x0A);
}

void Bot::RP_0x0B(char *DATA)
{
char blah = DATA[1];
DATA += 4;

while( *DATA != 0 )
{
RP_TEXT(blah, "%s",DATA );
DATA += strlen( DATA ) + 1;
}
}

void Bot::SP_0x0B()
{
ADWORD(0);
APACKET(0x0B);
}

void Bot::SP_0x0C(int ss, char *DATA)
{
ADWORD(ss); //0x02 to force join  0x01 to join broodwar on connect
ASTRING0(DATA);
APACKET(0x0C);
}

void Bot::SP_0x0E(char *DATA)
{
ASTRING0(DATA);
APACKET(0x0E);
}

void Bot::RP_0x0F(char *DATA)
{
char *USER;
char* TEXT;
unsigned long VAR[6];

for (int b=0; b < 6; b++)
VAR[b] = ( *(unsigned long *)(DATA + 4 + (4*b)) );

USER = DATA + 28;
TEXT = DATA + (strlen(USER)) + 29;

switch(VAR[0])
{
case 0x1: EID_USER(USER, VAR[1], TEXT); break;
case 0x2: EID_JOIN(USER, VAR[1], TEXT); break;
case 0x3: EID_LEFT(USER, VAR[1], TEXT); break;
case 0x4: break;
case 0x5: break;
case 0x6: break;
case 0x7: EID_CHAN(USER, VAR[1], TEXT); break;
case 0x9: break;
case 0xA: break;
case 0xD: break;
case 0xE: break;
case 0xF: break;
case 0x12: break;
case 0x13: break;
case 0x17: break;
case 0x18: break;
case 0x19: break;
default: if(Dump==false) hexdump(DATA,2500); return;
}

if(PSB == SB) BVDispatch(USER, TEXT, VAR);
}

void Bot::SP_0x14()
{
ASTRING(BPlug);
APACKET(0x14);
}

void Bot::RP_0x25(char *DATA)
{
if((Ping1 == true) || (Ping0 == true)) return;

if((SPing != 0) && (spingbb == false))
{
spingbb = true;
double waittime = (double)SPing/60;
RP_TEXT( DATA[1], "SPOOFING PING, WAITING %g MINUTES...\n", waittime); // sping=1800 -> 30min 1800031ms
sleep(SPing); // |0x0F-01| 0:1800016 sit0 [PXES 0 0 0 0 0 0 0 0 PXES] ||||| 1900 ---> |0x0F-17| 0:1900063 sit0 test
RP_TEXT( DATA[1], "SPOOFING COMPLETE\n",0);
}

DATA+=4;
SP_0x25(DATA);
}

void Bot::SP_0x25(char *DATA)
{
AVOID(DATA,4);
APACKET(0x25);
}

void Bot::SP_0x3A()
{
char buf[20];

doubleHashPassword(Password, ClientToken, ServerToken, buf);
RP_TEXT(0x3A, "dhashpw(\"%s\", 0x%08X, 0x%08X) = ",Password, ClientToken, ServerToken);
hex_print(buf, strlen(buf));
ADWORD(ClientToken);
ADWORD(ServerToken);
AVOID(buf, 20);
ASTRING0(Username);
APACKET(0x3A);
}

void Bot::RP_0x3A(char *DATA)
{
switch (*(unsigned long *)(DATA + 4))
{
case 0:
SP_0x14();
SP_0x0A();
SP_0x0B();
SP_0x46();
SP_0x0C(1,Channel);
//SP_0x0C(2,Channel);
return;
case 1: SP_0x3D(); return;
case 2: RP_TEXT(DATA[1], "login failed \n", 0); break;
case 6: RP_TEXT(DATA[1], "ACCOUNT closed \n", 0); break;
default: RP_TEXT(DATA[1],"unknown 0x3A exiting %s\n",DATA + 8); break;
}
exit(1);
}

void Bot::RP_0x3D(char *DATA)
{
switch (*(unsigned long *)(DATA + 4))
{
case 0: RP_TEXT(DATA[1], "ACCOUNT CREATED \n", 0); break;
case 2: RP_TEXT(DATA[1], "INVALID CHARACTERS\n ", 0); break;
case 3: RP_TEXT(DATA[1], "CONTAINS BANNED WORD\n ", 0); break;
case 4: RP_TEXT(DATA[1], "ALREADY EXISTS\n ", 0); break;
case 6: RP_TEXT(DATA[1], "TOO SHORT AN CHARACTERS\n ", 0); break;
default: RP_TEXT(DATA[1], "UNKNOWN 0x3D %s\n",DATA + 8); break;
}
exit(1);
}

void Bot::SP_0x3D()
{
char p[255];
for(int i=0; i < strlen(Password); i++)
{
p[i] = Password[i];
if (isupper(p[i]))
p[i] = tolower(Password[i]);
}
char buf[20];
hashPassword(p, buf);
RP_TEXT(0x3D, "hashpw: ", 0);
hex_print(buf, strlen(buf));
AVOID(buf, 20);
ASTRING0(Username);
APACKET(0x3D);
}

void Bot::RP_0x46(char *DATA)
{
RP_TEXT(DATA[1], "%s\n", DATA+21);
}

void Bot::SP_0x46()
{
ADWORD(0); //ADWORD(#) is acceptable even though it should be 0
APACKET(0x46);
}

void Bot::SP_0x50()
{
ADWORD(0);
AVOID(Client, strlen(Client));
ADWORD(VByte);
AVOID(Language, strlen(Language));
ADWORD(0);
ADWORD(0);
ADWORD(0);
ADWORD(0);
ASTRING0(ACountry);
ASTRING0(Country);
APACKET(0x50);

if(Ping0 == true)
SP_0x25("sit0");
}

void Bot::RP_0x50(char *DATA)
{
char mpqfile[FILENAME_MAX], digest[0x11];
char *mpqName = DATA + 24, *pch;
char *ChecksumFormula = DATA + strlen(mpqName) + 25;

int version;
int checksum;
int hashlen;
unsigned int product,value3,value4;

pch = strstr(mpqName,".mpq");
strncpy(pch,".dll",4);
strcpy(mpqfile, LDFile0);
strcat(mpqfile, mpqName);

ClientToken = rand();
ServerToken = *(unsigned int *)(DATA + 8);

CDKeyDecoder pm(CDKey);
hashlen = pm.calculateHash(ClientToken, ServerToken);
char* KeyHash = new char[hashlen];
pm.getHash(KeyHash);
RP_TEXT(DATA[1], "keyhash: ",0 );
hex_print(KeyHash, strlen(KeyHash));

product=pm.getProduct();
value3=pm.getVal1();
value4=pm.getVal2();

if(CheckRevision(VFile[1], VFile[2], VFile[3], ChecksumFormula, &version, &checksum, digest, mpqfile, VFile[0]))
{
RP_TEXT(DATA[1], "Arguments:\n Lockdown file: %s\n Checksum: %x\n Version: %x\n Digest: ", mpqfile, checksum, version, 0);
hex_print(digest, strlen(digest));
}
else
{
RP_TEXT(DATA[1], "CHECKREVISION FAILED\n", 0);
return;
}

SP_0x51(KeyHash, digest, version, checksum, product, value3);
}

void Bot::SP_0x51(char *KEY_HASH, char *EXE_INFO , unsigned long EXE_VER, unsigned long CHECKSUM, unsigned long PRODKEY, unsigned long PRIVKEY)
{
ADWORD(ClientToken);
ADWORD(EXE_VER);
ADWORD(CHECKSUM);
ADWORD(1);
ADWORD(0);
ADWORD(strlen(CDKey));
ADWORD(PRODKEY);
ADWORD(PRIVKEY);
ADWORD(0);
AVOID(KEY_HASH, 20);
ASTRING0(EXE_INFO);
ASTRING0(Username); //"AlenL");
APACKET(0x51);
}

void Bot::RP_0x51(char *DATA)
{
switch (*(unsigned long *)(DATA + 4))
{
case 0x000: SP_0x3A(); return;
case 0x100: RP_TEXT(DATA[1], "OLD GAME VERSION: %s\n", DATA + 8); break;
case 0x101: RP_TEXT(DATA[1], "INVALID VERSION\n", 0 ); break;
case 0x102: RP_TEXT(DATA[1], "GAME VERSION MUST BE DOWNGRADED: %s\n", DATA + 8); break;
case 0x200: RP_TEXT(DATA[1], "INVALID CD KEY\n ", 0 ); break;
case 0x201: RP_TEXT(DATA[1], "CD KEY IN USE BY: %s\n", DATA + 8 ); break;
case 0x202: RP_TEXT(DATA[1], "BANNED KEY\n", 0 ); break;
case 0x203: RP_TEXT(DATA[1], "WRONG PRODUCT\n", 0 ); break;
default: RP_TEXT(DATA[1], "DEFAULT: %s", DATA + 4 ); break;
}

exit(1);
}

8
Suggestions / socket.cpp
« on: January 09, 2011, 12:26:05 PM »
Code: [Select]
#include "bot.h"

void Bot::SOCK_CON()
{
#ifdef _WIN32
WSADATA wsaData;
WSAStartup(MAKEWORD(1,1), &wsaData);
#endif

if( SOCK_CREATE() == true) Login();
}

void Bot::SOCK_DISCON()
{
#ifdef _WIN32
shutdown(sock, SD_BOTH);
close(sock);
WSACleanup();
#else
close(sock);
#endif

Connected = false;
printf("Socket Closed\n");
}

void Bot::Login()
{
if(!strcmp(Client,"TAHC"))
{
Connected = true;
APACKET0("\x03\x04%s\r\n%s\r\n/join %s\r\n",  Username, Password, Channel);
}
else
{
send(sock,"\x01",1,0);
SP_0x50();
}

SOCK_HANDLER();
}

bool Bot::SOCK_CREATE()
{
struct hostent *h;
struct sockaddr_in their_addr;

// if this is a hostname and not an IP address, resolve it
char *p = Server;
while (*p && (isdigit(*p) || (*p == '.')))
p++;

if ((h=gethostbyname(Server)) == NULL)
{
printf("gethostbyname error\n");
return 0;
}

if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
printf("socket error \n");
return 0;
}

their_addr.sin_family = AF_INET;
their_addr.sin_port = htons(6112);

if (*p)
their_addr.sin_addr = *((struct in_addr *)h->h_addr);
else
their_addr.sin_addr.s_addr = inet_addr(Server);

//bzero(&(their_addr.sin_zero), 8);

if (connect(sock, (struct sockaddr *)&their_addr, sizeof(struct sockaddr)) == -1)
{
printf("connect error\n");
return 0;
}

return 1;
}

void Bot::SOCK_HANDLER()
{
int numbytes;
int nBufLen=0;
int nBufPos=0;
char stageBuf[2048];

while(1)
{
int nNumToRead = 2048 - nBufLen - nBufPos;

if (nNumToRead == 0)
{
memmove(stageBuf, stageBuf+nBufPos, nBufLen);
nBufPos = 0;
nNumToRead = 2048 - nBufLen;
}

numbytes = recv(sock, stageBuf + nBufPos + nBufLen, nNumToRead, 0);

if (numbytes <= 0)
{
printf("\nSOCK_HANDLERB() ERROR\n");
return;
}

nBufLen += numbytes;

while (nBufLen > 0)
{
char *m = stageBuf + nBufPos;
int packetlen = 0;
if(!strcmp(Client,"TAHC"))
{
while (packetlen < nBufLen)
{
if (m[packetlen] == '\n') break;
packetlen++;
}
packetlen++;
}
else
{
if ((unsigned char)m[0] != (unsigned char)0xFF)
{
printf("\nNOT A 0xFF HHEADER\n");
hexdump(m,numbytes);
break;
}
packetlen = *(unsigned short*)( m + 2 );
}

if (packetlen > nBufLen) break;

if((PSB == SB) && (Dump==true))
hexdump(m,packetlen);

if(!strcmp(Client,"TAHC"))
{
m[packetlen - 1] = '\0';
//if (isdigit(*m))
CDispatch(m);
}
else
{// add to cut that extra shit with like memcpy(m,m,packetlen); then a m[packetlen+1] ="/0";
RP_HANDLER(m[1], m,packetlen);
}

nBufLen -= packetlen;
nBufPos += packetlen;
}

if (!nBufLen) nBufPos = 0;
}
}

9
Download / Enigma 0.991
« on: October 01, 2010, 12:58:40 PM »
Enigma 0.991 || by -=^$iT()^=- (BETA)

http://darkblizz.org/Forum2/downloads/?sa=downfile&id=33



:: Fixed all the options in bot.conf, so everything works for once
:: Fixed packet view, made more 'user friendly'
:: Haven't enabled diablo 2 or warcraft 3 login yet, as well as support on windows. (will do so in the future)

10
Support / HELP bot.conf
« on: September 29, 2010, 08:43:25 PM »
Enigma 0.992 bot.conf

Code: [Select]
,1,1

Language=SUne
ACountry=USA
Country=United States

LDFile0=/home/sit0/Enigma/lockdown/DLLs/

D2File0=/home/sit0/Enigma/lockdown/DRTL.bin
D2File1=/home/sit0/Enigma/lockdown/VD2D/Game.exe
D2File2=/home/sit0/Enigma/lockdown/VD2D/Bnclient.dll
D2File3=/home/sit0/Enigma/lockdown/VD2D/D2Client.dll
D2Byte=0D

SCFile0=/home/sit0/Enigma/lockdown/PXES/PXES.bin
SCFile1=/home/sit0/Enigma/lockdown/PXES/StarCraft.exe
SCFile2=/home/sit0/Enigma/lockdown/PXES/storm.dll
SCFile3=/home/sit0/Enigma/lockdown/PXES/battle.snp
SCByte=D3

W2File0=/home/sit0/Enigma/lockdown/NB2W/NB2W.bin
W2File1=/home/sit0/Enigma/lockdown/NB2W/Warcraft II BNE.exe
W2File2=/home/sit0/Enigma/lockdown/NB2W/Storm.dll
W2File3=/home/sit0/Enigma/lockdown/NB2W/Battle.snp
W2Byte=4F

W3File0=/home/sit0/Enigma/lockdown/3RAW/3RAW.bin
W3File1=/home/sit0/Enigma/lockdown/3RAW/StarCraft.exe
W3File2=/home/sit0/Enigma/lockdown/3RAW/storm.dll
W3File3=/home/sit0/Enigma/lockdown/3RAW/battle.snp
W3Byte=18

BPlug=tenb
SPing=0
1Ping=0
0Ping=1

Dump=1
Auto=0

CMD=$

{
Username=sit0
Password=xererq
Server=63.240.202.120
Channel=warez
Client=68XIPXES
CDKey=3536783417369
Delay=110
}
{
Username=sit0
Password=xererq
Server=63.240.202.120
Channel=warez
Client=68XIPXES
CDKey=3536783417369
Delay=110
}
{
Username=sit0
Password=xererq
Server=63.240.202.120
Channel=warez
Client=68XIPXES
CDKey=3536783417369
Delay=110
}

11
Download / Enigma 0.99
« on: September 21, 2010, 10:38:37 PM »
Enigma 0.99 || by -=^$iT()^=- (BETA)

Description:
console *nix bot which runs SC/BW/W2/TELNET


Download Here

Screenshots:
[hs width=300 height=200]http://darkblizz.org/sit0/Enigma/enigma.png[/hs]

12
Sniper Chat / List of Sniper Maps
« on: July 12, 2009, 09:54:22 PM »
hopefully we can get all the maps that map creators have made for snipers and put htem in here with a description of each...

13
Sniper Hackers / Accusations of Hackers
« on: July 12, 2009, 09:51:32 PM »
If you have caught someone hacking using a cheat which allows him/her an advantage in snipers, please don't hesitate to make a topic in this section with a substantial amount of proof usually including bwchart, SS's, replays, or videos

Then any member of this forum can discuss whether or not it indeed was a type of cheat

14
Sniper Hackers / 3oD[SouL] (Back in the day)
« on: July 12, 2009, 09:36:36 PM »
once upon a time there was a sniper back in 2001 named soul[demon]. He was a co-leader of x(DeMoN)x at one point. very cool kid i might add. Now he is known as 3oD[SouL].

I find it funny how i hear he says he has never hacked... because back when he was in x(DeMoN)x and I created the first mmh, I gave it to him and he used to use it.

Now you might not believe me but to tell you the truth I have no reason to lie at all. This is just a video game to me which I don't play but certain people shouldn't take a game so seriously to say they never have cheated when in fact they have...

15
Former Clans / List of Former Clans
« on: July 12, 2009, 03:23:27 PM »
have anything to say about old sniper clans like clan members, clan history, etc? Well make a topic about that clan if one does not already exist and post away!

Pages: [1] 2