Page 1 of 3 123 LastLast
Results 1 to 15 of 44
  1. #1
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8

    Lightbulb Nexon's Private/Public Key's

    Nexon's public and private key's are one step closer to discovery.Here's a algorithm and some info.With these key's we can run are own lobby's/sign files the same way nexon does.ECDSA Param's are in there,im hoping to get a P.O.C going.....
    .signature has problems, re-make with post SSLeay045.....SHA1

    ENCRYPTED PRIVATE KEY...PRIVATE KEY.ANY PRIVATE KEY..................$...$.. $...........M...O......................@...`...
    PEM part of OpenSSL 0.9.8k 25 Mar 2009..0123456789ABCDEF....C:\src\buildtools\branch es\voon\tmp4x2fne\externals\openssl-0.9.8k\crypto\pem\pem_lib.c.phrase is too short, needs to be at least %d chars..Enter PEM pass phrase:..Proc-Type: 4,...BAD-TYPE....MIC-ONLY....MIC-CLEAR...ENCRYPTED...DEK-Info: ..PKCS #7 SIGNED DATA.TRUSTED CERTIFICATE.X509 CERTIFICATE....-----END ...-----...-----BEGIN .strlen(objstr)+23+2*enc->iv_len+13 <= sizeof buf....enc->iv_len <= (int)sizeof(iv)..Proc-Type: .Expecting: .X509_CRL....crl.X509_CRL_INFO...revoked.nextUpdat e..lastUpdate..issuer..X509_REVOKED....extensions. .revocationDate..serialNumber

    CERTIFICATE.RSA PRIVATE KEY.RSA PUBLIC KEY..PUBLIC KEY..DSA PRIVATE KEY.DSA PARAMETERS..EC PARAMETERS...EC PRIVATE KEY..DH PARAMETERS...
    md4WithRSAEncryption....RSA-MD4.
    aes-256-cfb.AES-256-CFB.aes-256-ofb.AES-256-OFB.aes-256-cbc.aes-256-ecb.AES-256-ECB.aes-192-cfb.AES-192-CFB.aes-192-ofb.AES-192-OFB.aes-192-cbc.AES-192-CBC.aes-192-ecb.AES-192-ECB.aes-128-cfb.AES-128-CFB.aes-128-ofb.AES-128-OFB.aes-128-cbc.aes-128-ecb.AES-128-ECB.Microsoft CSP Name..CSPName.ecdsa-with-SHA1.prime256v1..prime239v3..prime239v2..prime239v 1..prime192v3..prime192v2..prime192v1..id-ecPublicKey..characteristic-two-field....prime-field.ANSI X9.62..ansi-X9-62..X509v3 No Revocation Available..

    CERTIFICATE.RSA PRIVATE KEY.RSA PUBLIC KEY..PUBLIC KEY..DSA PRIVATE KEY.DSA PARAMETERS..EC PARAMETERS...EC PRIVATE KEY..DH PARAMETERS...memory buffer...

    PKEY_USAGE_PERIOD...T........œ,................... ...............œ,.........‰...........lK..B).‰... ........`K..B).........=L.............x=L.Not After: .Not Before: ....decipherOnly....Decipher Only...encipherOnly....Encipher Only...cRLSign.CRL Sign....keyCertSign.Certificate Sign....keyAgreement....Key Agreement...dataEncipherment....Data Encipherment...keyEncipherment.Key Encipherment....nonRepudiation..Non Repudiation.digitalSignature....Digital Signature...objCA...Object Signing CA...emailCA.S/MIME CA...sslCA...SSL CA..reserved....Unused..objsign.Object Signing..server..client..G


    %s%02X..%*sKey Id: .%*sAlias: %s....%*sNo Rejected Uses.....%*sRejected Uses:.%*s...%*sNo Trusted Uses......%*sTrusted Uses:.%*s....<EMPTY>.....%*s.%*s<Not Supported>..%*s<Parse Error>....%*s%s...: %s....%*s%s:..Generator (hybrid):.Generator (uncompressed):...Generator (compressed):.%s %s%lu (%s0x%lx)..%s 0.... recommended-private-length: %d bits.....generator:..prime:..Diffie-Hellman-Parameters: (%d bit).....


    PKCS7_ATTR_VERIFY...PKCS7_ATTR_SIGN.PKCS7_ATTRIBUT ES....PKCS7_DIGEST....md..PKCS7_ENCRYPT...PKCS7_SI GN_ENVELOPE.PKCS7_ENC_CONTENT...PKCS7_RECIP_INFO.. ..enc_key.key_enc_algor...PKCS7_ENVELOPE..enc_data ....recipientinfo...PKCS7_ISSUER_AND_SERIAL.serial ..PKCS7_SIGNER_INFO...unauth_attr.enc_digest..dige st_enc_alg..auth_attr...digest_alg..issuer_and_ser ial...PKCS7_SIGNED....signer_info.cert....contents ....md_algs.d.encrypted.d.digest....d.signed_and_e nveloped..d.enveloped.d.sign..d.data..d.other

    DSA-Parameters: (%d bit)....coefficient:....exponent2:..exponent1:..pr ime2:.prime1:.privateExponent:....publicExponent:. Exponent:...modulus:....Modulus (%d bit):...Private-Key: (%d bit)...G: ...Q: ...P: ...pub: ...priv:...Seed:...Cofactor: ..Order: .B: ...A: ...Prime:..Polynomial:.Basis Type: %s..Field Type: %s..ASN1 OID: %s....ECDSA-Parameters: (%d bit)..X........=).................,............. ............Œ........=).................,....... ..........................=).................,. W,.....................

    PKCS8_PRIV_KEY_INFO.pkey....pkeyalg.........

    11>...ENUMERATED..REAL....EXTERNAL....OBJECT DESCRIPTOR...OBJECT..OCTET STRING....BIT STRING..INTEGER.BOOLEAN.EOC.%-18s...%2d %-15s...(unknown)...<ASN1 %d>...appl [ %d ].cont [ %d ].priv [ %d ] ....prim: ..cons: ..length is greater than %ld..Error in encoding...BAD ENUMERATED..BAD INTEGER.00..%02X....[HEX DUMP]:.:%d.Bad boolean.....:BAD OBJECT.d=%-2d hl=%ld l=inf ...d=%-2d hl=%ld l=%4ld ...%5ld:.... Public key OCSP hash: ..... Subject OCSP hash: .%02x%s... ... Signature Algorithm: ...Bad time value..%s %2d %02d:%02d:%02d %d%s.. GMT....X509v3 extensions...%12sUnknown Public Key:.....%12sEC Public Key:..%12sDSA Public Key:.....%12sRSA Public Key: (%d bit)....%12sUnable to load Public Key...%12sPublic Key Algorithm: .. Subject Public Key Info:.... Subject:%c... Not After : ... Not Before: .... Validity.... Issuer:%c...%8sSignature Algorithm: ....%02x%c...%12s%s. (Negative). %s%lu (%s0x%lx).... Serial Number:..%8sVersion: %lu (0x%lx)..... Data:...Certificate:....'()+,-./:=?.maxsize=....minsize=..............
    Last edited by xx404xx; 08-19-2011 at 02:13 PM.

  2. The Following 4 Users Say Thank You to xx404xx For This Useful Post:

    m0k1 (08-20-2011),matypatty (08-19-2011),se7enthsin (09-25-2011),Xlilzoosk8rX (08-25-2011)

  3. #2
    steven1578's Avatar
    Join Date
    Aug 2008
    Gender
    male
    Location
    CShell.dll
    Posts
    684
    Reputation
    1
    Thanks
    936
    My Mood
    Busy
    Wth is this?
    R.I.P Grandma! 3-17-2012

  4. #3
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8
    The Algorithm's for code signing,and it goes hand and hand with nexon's keys.With this we could make full cheat client's,because if we can sign there file's we can make are own custom client's, and maybe even built in aimbot/hack panel's.There is still work to be done though,i still haven't found the key's but the algo is there and i am looking at older ver's for more info.We could do Private server's if we uncovered the key's.
    Last edited by xx404xx; 08-19-2011 at 02:25 PM.

  5. #4
    Skaterforeva1's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    Up your ass
    Posts
    917
    Reputation
    32
    Thanks
    476
    My Mood
    Psychedelic
    could you sum this up allot smaller cause that just omg

    ^Suck it!


  6. #5
    Flengo's Avatar
    Join Date
    May 2010
    Gender
    male
    Location
    Ontario, Canada
    Posts
    15,714
    Reputation
    3319
    Thanks
    11,143
    My Mood
    Happy
    Maybe make it neater next time too.
    I Read All Of My PM's & VM's
    If you need help with anything, just let me know.
     
     
    VM | PM

    Publicist Since 04.04.2015
    Middleman Since Unknown - Unknown
    Global Moderator Since 08.01.2013
    Donator Since 05.29.2013

    Minion+ Since 04.18.2013

    District 187 Minion Since 04.04.2013
    Steam Minion Since 02.26.2013
    WarRock Minion Since 02.19.2013
    A.V.A Minion Since 02.13.2013
    DayZ Minion Since 01.21.2013
    Combat Arms Minion Since 12.26.2012
    Contributor Since 11.16.2012
    Member Since 05.11.2010


  7. #6
    Skaterforeva1's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    Up your ass
    Posts
    917
    Reputation
    32
    Thanks
    476
    My Mood
    Psychedelic
    Quote Originally Posted by comando2056 View Post
    Maybe make it neater next time too.
    yes that would realy help

    ^Suck it!


  8. #7
    matypatty's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Posts
    864
    Reputation
    156
    Thanks
    2,689
    My Mood
    Amused
    maybe you could all understand it and stop complaining.... This makes a lot of sense thanks for the post!

  9. The Following User Says Thank You to matypatty For This Useful Post:

    OBrozz (08-20-2011)

  10. #8
    supercarz1991's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    North of Hell, South of Heaven
    Posts
    6,067
    Reputation
    323
    Thanks
    3,323
    My Mood
    Doh
    This is 100% leeched and Idk how the hell u got it cuz it was posted a month ago in a private Modding section on another forum

  11. #9
    Stevenom's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Location
    Summoner's Rift
    Posts
    17,746
    Reputation
    1087
    Thanks
    1,916
    My Mood
    Doubtful
    Quote Originally Posted by Skaterforeva1 View Post
    could you sum this up allot smaller cause that just omg
    You can't sum up the algorithm.

    Quote Originally Posted by supercarz1991 View Post
    This is 100% leeched and Idk how the hell u got it cuz it was posted a month ago in a private Modding section on another forum
    Proof?

  12. The Following User Says Thank You to Stevenom For This Useful Post:

    combatarmsrager3 (08-21-2011)

  13. #10
    Terell.'s Avatar
    Join Date
    Oct 2009
    Gender
    male
    Location
    JAMAICAA
    Posts
    6,923
    Reputation
    273
    Thanks
    1,163
    My Mood
    Angry
    Thank you.

    Warrock Minion 8-13-2011 - N/A
    A.V.A Minion since 11-1-11 - 11-12-11

  14. #11
    supercarz1991's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    North of Hell, South of Heaven
    Posts
    6,067
    Reputation
    323
    Thanks
    3,323
    My Mood
    Doh
    Quote Originally Posted by Boss View Post

    You can't sum up the algorithm.



    Proof?
    i was wrong, i just now realized...being on 2 forums at once where the games both have some sort of algorithm for compression and such...yeah...my bad

    commando: You're probably the best non-coder coder I know LOL


  15. #12
    Zeused's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    1,599
    Reputation
    2
    Thanks
    68
    My Mood
    Relaxed
    I really don't understand what is this. Could somebody explain this to me in English.

    -The Joker.

  16. #13
    The Dark Knight's Avatar
    Join Date
    Sep 2010
    Gender
    male
    Location
    MPGH
    Posts
    5,646
    Reputation
    95
    Thanks
    701
    no this is the C++ language section, would you care to step out? xD

  17. #14
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8
    PBE-MD2-DES PBE-MD5-DES
    These algorithms were included in the original PKCS#5 v1.5 specification. They only offer 56 bits of protection since they both use DES.

    PBE-SHA1-RC2-64 PBE-MD2-RC2-64 PBE-MD5-RC2-64 PBE-SHA1-DES
    These algorithms are not mentioned in the original PKCS#5 v1.5 specification but they use the same key derivation algorithm and are supported by some software. They are mentioned in PKCS#5 v2.0. They use either 64 bit RC2 or 56 bit DES.

    PBE-SHA1-RC4-128 PBE-SHA1-RC4-40 PBE-SHA1-3DES PBE-SHA1-2DES PBE-SHA1-RC2-128 PBE-SHA1-RC2-40
    These algorithms use the PKCS#12 password based encryption algorithm and allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
    Here is the read key command for openssl
    Read a DER unencrypted PKCS#8 format private key:

    openssl pkcs8 -inform DER -nocrypt -in key.der -out key.pem
    Edit:There's still the Verisign problem also,unless someone happen's to find valid cert's somehow.

    Edit2:Verisign has been hacked before,and im pretty sure this hash exploit is still out there that would let us generate %100 valid cert's.

    http://www.computerworld.com/s/artic...ring_Web_sites

    Well first of all how do you think nexon does pming and thing's like that.....The Diffie-Hellman Key Exchange
    Public Key
    It is also possible to use Diffie–Hellman as part of a public key infrastructure. Alice's public key is simply (ga,g,p). To send her a message Bob chooses a random b, and then sends Alice gb (un-encrypted) together with the message encrypted with symmetric key (ga)b. Only Alice can decrypt the message because only she has a. A preshared public key also prevents man-in-the-middle attacks.
    In practice, Diffie–Hellman is not used in this way, with RSA being the dominant public key algorithm. This is largely for historical and commercial reasons, namely that RSA created a Certificate Authority that became Verisign. Diffie–Hellman cannot be used to sign certificates, although the ElGamal and DSA signature algorithms are related to it. However, it is related to MQV, STS and the IKE component of the IPsec protocol suite for securing Internet Protocol communications.


    This is not leached.This is an ECDSA fail.I also have the login token if anyone is interested.

    This is how long the PKEY is usage period,self explanatory
    PKEY_USAGE_PERIOD...T........œ,................... ...............œ,.........‰...........lK..B).‰... ........`K..B).........=L.............x=L.Not After: .Not Before: ....decipherOnly....Decipher Only...encipherOnly....Encipher Only...cRLSign.CRL Sign....keyCertSign.Certificate Sign....keyAgreement....Key Agreement...dataEncipherment....Data Encipherment...keyEncipherment.Key Encipherment....nonRepudiation..Non Repudiation.digitalSignature....Digital Signature...objCA...Object Signing CA...emailCA.S/MIME CA...sslCA...SSL CA..reserved....Unused..objsign.Object Signing..server..client..G
    Oh and btw look at the memory buffer here.
    CERTIFICATE.RSA PRIVATE KEY.RSA PUBLIC KEY..PUBLIC KEY..DSA PRIVATE KEY.DSA PARAMETERS..EC PARAMETERS...EC PRIVATE KEY..DH PARAMETERS...memory buffer...
    ^

    You will notice ECDSA-PARAMETERS from the blurb above
    ECDSA-Parameters: (%d bit)..X........=).................,............. ............Œ........=).................,....... ..........................=).................,. W,.....................

    And here it check's if it's revoked,
    revoked.nextUpdat e..lastUpdate..issuer..X509_REVOKED....extensions. .revocationDate..serialNumber
    The end goal is to sign are own content, as you can see below
    PKCS7_ATTR_VERIFY...PKCS7_ATTR_SIGN.PKCS7_ATTRIBUT ES....PKCS7_DIGEST....md..PKCS7_ENCRYPT...PKCS7_SI GN_ENVELOPE.PKCS7_ENC_CONTENT...PKCS7_RECIP_INFO.. ..enc_key.key_enc_algor...PKCS7_ENVELOPE..enc_data ....recipientinfo...PKCS7_ISSUER_AND_SERIAL.serial ..PKCS7_SIGNER_INFO...unauth_attr.enc_digest..dige st_enc_alg..auth_attr...digest_alg..issuer_and_ser ial...PKCS7_SIGNED....signer_info.cert....contents ....md_algs.d.encrypted.d.digest....d.signed_and_e nveloped..d.enveloped.d.sign..d.data..d.other
    Last edited by xx404xx; 08-21-2011 at 11:21 AM.

  18. #15
    Obama's Avatar
    Join Date
    Dec 2008
    Gender
    male
    Location
    The Black house
    Posts
    22,197
    Reputation
    870
    Thanks
    6,071
    My Mood
    Cool
    This is really interesting, good luck.

Page 1 of 3 123 LastLast

Similar Threads

  1. Starcraft PRIVATE CD Key
    By arunforce in forum Buying Accounts/Keys/Items
    Replies: 0
    Last Post: 02-11-2010, 02:05 PM
  2. IS NEXON ENGINE.EXE A KEY LOGER ?
    By bigbadwolf in forum Combat Arms Hacks & Cheats
    Replies: 52
    Last Post: 06-16-2009, 05:40 PM
  3. have the public hacks been patched by nexon???
    By raw95 in forum Combat Arms Hacks & Cheats
    Replies: 2
    Last Post: 01-03-2009, 02:59 PM
  4. Mentals Private Hack for Public rofl
    By truffless in forum WarRock - International Hacks
    Replies: 29
    Last Post: 10-09-2007, 10:03 AM
  5. -=*Video* QuantumLeap V1.0 Private.=- Should it be public?
    By Methadone727 in forum WarRock - International Hacks
    Replies: 67
    Last Post: 05-30-2007, 06:42 PM