Results 1 to 11 of 11
  1. #1
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    5,052
    My Mood
    Cool

    Project Hyperion's Base [Incomplete]

    This is not the full thing as yet but, why not release something for it as it is an educational base so to say. I have swayed off my original path to add increase security, I've tried to protect the hack from the user but I haven't yet protected the user's from the server, that is what I am hoping to do, see if I can explain to someone here how, users of this hack will always be protected from the server and the server will be protected from users (as much as i can. This is a long shot just so you know. For use on MPGH, remove internet features such as Login, Online Saving, and use offline, with local saving.

    Now more than ever i should explain the project.

    About the Project

    Hyperion is a project that I created to solve a few VIP hack problems, while also being an education base. The concept is to allow users to log into their hacks, use the hacks that was permitted be the server, identified by the user type, weither be, VIP, Super User, Standard User or Guest. It is also hope to bring a feature allowing you to download the addresses / addies of a hack from the server so that less updates to a hack is required. Because the project is not Completed as yet, it is still very educational to many people, and to my self.
    The project is also on ******, "Hyperion"



    1. Graphics User Interface (GUI)

      • The Project uses Gwen. Gwen is an open source GUI library which support multiply renders(example: DirectX 9 and OpenGL). I am using a modified Gwen in this project to give it the best compatibility (to my knowledge) to the environments that hackers use. I choose Gwen because of its simplicity, the fact its open source and free also because it still looks good and wasn't to hard to get it working in a hooked environment(i lied, failed many times).
      • In-Game testing haven't started as yet so I cannot say that I am 100% sure that this preview/release will work, but why not learn something from it while you try to modify it.
      • Skins : Gwen supports Skins allowing you to have your own Gwen, by modifying the skin and thanks to my modification, you do not have to use external files, you can use byte arrays inside the hacks, I was also thinking about the capability to download the skins, i mean it is already in a byte array, surely downloading and changing wont be a problem.

    2. Settings

      • Using JSON, I was able to create a make shift function that allows you to save specific data from the Gwen GUI. These settings can then be sent to the server, or pulled from the server, works perfectly from what I see, but modifications are recommended.

    3. Security

      • The big topic everyone had was security. I tried my best and currently still trying my best to do this, just note I have limited knowledge of it, I did some reading but it didn't help so I got creative. Using dynamic GUIDs and 512bit Hash, I created this thing where, every time the user interacts with the database, the GUID changes, here is how it works. Upon login into the system, you are given a log-in GUID which is used for the features for other features later on, and the GUID will be changed when the user saves settings, load settings or log out. The reason I implemented this system is because of two things, User and Hacker. This limits the user to one system at any one time. You cannot login to your account, then have your friend login to the same account to share the hacks. It also isn't limited to one system like the other implementation is, where the GUID is stored on the system, and you cannot change systems without permission. Important / static content arriving to the server is hash upon arrival, login for example, the user name and password are hashed right at the start to protect the users from the database user. Yes I know people might change the server files so they can see the content, which is why I am going to add encryption to the client side, so not only does the server encrypts the content, but it is only processing encrypted 'static' content. The reason i only encrypt the static content is because Hashing the settings would making it 'un-decrypable' so you wont be able to load your settings. And the GUID is already encrypted, random data.
        I know some people might say that is a lot of stuff to be sending back and forth, and changing but if your able to play an online game, expect much more data to be transmitted, my only worry is that hacks using this base can have a lot of features, and the settings can get huge, about 50kb ~ 100kb, stuff u can download in 1 second from this you should understand that their is not that much to worry about with bandwidth.
        Example of the Dynamic GUID with 512bit Hash
        Code:
        57D4AD99EED761277DD7DF4087B6CBBACD25C86DD5C3C86A2461D8CC7437C2E5811DD9BD59DD674C6F3987D8F3A4B2D77A61CC7C8FF9B98F6E4C92562C6E5A14

    4. Debugger (Logger)
      • ​I implemented a debugger which stores its information locally (I can ask for it to be sent, but because this is a base, not a full hack, I don't know what information the other users might ask for, so I left it locally and at request the user can send me the information if he or she wants. The debugger only works if the client file is compiled in debug mode. This is so you can get more speed out of the release versions.

    5. Events
      • Because I was playing around in JAVA lately, I created a 'Runnable' class, allowing me to create functions using lambda and run them at some event, for example login. After a user login is successful, it calls the event for onLogin, which I used to start the Main Window.

    6. String Encryption
      • ​The Strings in the hack are encrypted using XOR, I am planning on creating a string class but, like I said this is incomplete. The application I used to create these xor strings will be in the files also a how to install so you can use it to best.


    Preview Pictures
    This is limited because like i said Incomplete
     

    GUI





    Main Constructor[I Ran the Server on port 6112 because it was port forward and I had stuff i wanted to host, u can change the port]




    Event Procedures




    VirusTotal
    Jotti
    <b>Downloadable Files</b> Downloadable Files
    Last edited by topblast; 05-12-2013 at 12:26 PM. Reason: Virus Scans & Attachment Change
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  2. The Following 19 Users Say Thank You to topblast For This Useful Post:

    ademir1 (05-13-2013),AlDaiiR181 (06-01-2013),ARGB (05-12-2013),arun823 (05-12-2013),[MPGH]AVGN (05-12-2013),bugadogames1 (06-04-2013),CheatJlle (05-13-2013),Cryptonic (05-12-2013),Donor (06-16-2013),ebbe0467 (06-08-2013),[MPGH]Flengo (05-12-2013),Flengo Jr. (05-12-2013),Genesis (05-13-2013),gibam761 (05-12-2013),Hello-World (05-29-2013),nova0001 (06-14-2013),pDevice (05-13-2013),Timboy67678 (05-13-2013),vogelj1988 (06-18-2013)

  3. #2
    ARGB's Avatar
    Join Date
    Apr 2013
    Gender
    male
    Posts
    68
    Reputation
    10
    Thanks
    9
    My Mood
    Dead
    very good job
    im gonna use parts of this

  4. #3
    Flengo's Avatar
    Join Date
    May 2010
    Gender
    male
    Location
    /admincp/banning.php
    Posts
    20,591
    Reputation
    5180
    Thanks
    14,179
    My Mood
    Inspired
    You forgot your virus scans. I had to remove a file since it had an outside link inside it. It was the Xor thing.

    The rest is excellent work and I scanned the file for you.

    Just so MPGH members know, this will not be allowed for use on MPGH. It could be possible in the near future if something is worked out for a public server to be used which would be managed by a staff member or something.

    Anyway, at the moment that wont be. Excellent work as usual, Topblast

    /Approved
    I Read All Of My PM's & VM's
    If you need help with anything, just let me know.

     


     
    VM | PM | IM
    Staff Administrator Since 10.13.2019
    Publicist Since 04.04.2015
    Middleman Since 04.14.2014
    Global Moderator Since 08.01.2013
    Premium Since 05.29.2013

    Minion+ Since 04.18.2013

    Combat Arms Minion Since 12.26.2012
    Contributor Since 11.16.2012
    Member Since 05.11.2010


  5. The Following User Says Thank You to Flengo For This Useful Post:

    topblast (05-12-2013)

  6. #4
    Cryptonic's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    United Provinces of Canada
    Posts
    1,313
    Reputation
    44
    Thanks
    190
    My Mood
    Bored
    Doing an amazing job so far. Can't wait to see the finished product.

  7. The Following User Says Thank You to Cryptonic For This Useful Post:

    topblast (05-12-2013)

  8. #5
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    5,052
    My Mood
    Cool
    Quote Originally Posted by Flengo View Post
    You forgot your virus scans. I had to remove a file since it had an outside link inside it. It was the Xor thing.

    The rest is excellent work and I scanned the file for you.

    Just so MPGH members know, this will not be allowed for use on MPGH. It could be possible in the near future if something is worked out for a public server to be used which would be managed by a staff member or something.

    Anyway, at the moment that wont be. Excellent work as usual, Topblast

    /Approved
    I forgot about those, haven't post in a while i guess, sorry ^^

    @ZysorceN
    is this the security u wanted?
    Last edited by topblast; 05-12-2013 at 12:47 PM.
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  9. The Following User Says Thank You to topblast For This Useful Post:

    pDevice (05-14-2013)

  10. #6
    AVGN's Avatar
    Join Date
    Sep 2009
    Gender
    male
    Location
    Kekistan
    Posts
    15,566
    Reputation
    1817
    Thanks
    6,678
    Wow your English has gotten a lot better lol.




  11. The Following 3 Users Say Thank You to AVGN For This Useful Post:

    pDevice (05-14-2013),topblast (05-13-2013),[B]oss (05-15-2013)

  12. #7
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    5,052
    My Mood
    Cool
    Quote Originally Posted by AVGN View Post
    Wow your English has gotten a lot better lol.
    lol, that is thanks to a friend of mine, just being around him forces you to use good english.
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  13. #8
    -Bl00d-'s Avatar
    Join Date
    Sep 2011
    Gender
    female
    Location
    Imma girl what about it?
    Posts
    481
    Reputation
    10
    Thanks
    53
    My Mood
    Twisted
    its been a long time topblast i havent talked to you since teamstatic... good job you got this going good.
    Successful buys: 20
    Successful sells: 4
    Successful trades: 9
    Scammed: 4

     
    https://www.mpgh.net/forum/490-vouches/560562-vouches.html

    ^^^^^^^^^^^
    vouche for me?

  14. #9
    ZysorceN's Avatar
    Join Date
    Aug 2012
    Gender
    female
    Location
    California
    Posts
    68
    Reputation
    10
    Thanks
    916
    My Mood
    Aggressive
    Quote Originally Posted by topblast View Post


    I forgot about those, haven't post in a while i guess, sorry ^^

    @ZysorceN
    is this the security u wanted?
    what do you mean?

  15. The Following User Says Thank You to ZysorceN For This Useful Post:

    DeadCode (05-26-2013)

  16. #10
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    5,052
    My Mood
    Cool
    Quote Originally Posted by ZysorceN View Post
    what do you mean?
    You were talking about the security in the project proposal
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  17. #11
    DeadCode's Avatar
    Join Date
    Apr 2012
    Gender
    male
    Posts
    16
    Reputation
    10
    Thanks
    8
    My Mood
    Amazed
    Nice! If you guys just want GWEN modified to accept Byte Arrays I released one a little while ago: https://www.mpgh.net/forum/31-c-c-pro...d-sprites.html

Similar Threads

  1. [Discussion] Project Hyperion [ Am i getting to creative?]
    By topblast in forum Combat Arms Hack Coding / Programming / Source Code
    Replies: 40
    Last Post: 05-07-2013, 07:03 PM
  2. [Discussion] Project Hyperion [ Am i getting to creative?]
    By topblast in forum C++/C Programming
    Replies: 15
    Last Post: 05-04-2013, 02:12 AM
  3. [Help] tier0 error when injecting dll project (Source SDK Base)
    By DanK in forum C++/C Programming
    Replies: 5
    Last Post: 08-11-2011, 04:49 PM
  4. C# BASE INCOMPLETE
    By proCODERXx in forum CrossFire Hack Coding / Programming / Source Code
    Replies: 13
    Last Post: 08-10-2011, 04:57 PM
  5. Project blackout Glitch [sentry base] HD
    By myfirstn4me in forum Piercing Blow Discussions
    Replies: 1
    Last Post: 05-28-2011, 02:31 PM