C3Subtitles: 32c3: How hackers grind an MMORPG: by taking it apart!
back

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:54:49
Language
English
Abstract
When an online game no longer captivates interest, what do you do? Grind on the network protocol, of course! How does it work, is it secure - and, how can you still get away while doing this?

Online games are hardly new, but their inner workings are rarely (if ever) documented. This needs to change: if it runs on my computer and uses my network I want to know what's going on!

This talk starts by analysing the network protocol of the Runes of Magic game, and continues by introducing specific tools to aid this process and the steps taken to come up with such tools. Continuing with a demonstration to whet your appetite: we will show how much <i>fun</i> it is to do this kind of work, and finally some advice on the legal side of things.

All custom tools and methods described are not specific to a game per se, however using custom tools will greatly improve your reversing experience. They aren't even specific to games, the same techniques can be used to analyse about any network protocol.

Talk ID
7493
Event:
32c3
Day
2
Room
Hall G
Start
9:45 p.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
Rink Springer