QuerySEQ
11-06-2002, 05:04 PM
I have been reading the threads about Packet Sniffers, Key Sniffers and detecting if SOE is watching those that use em??
I used a few packet sniffers and port checkers to watch all the traffic coming into and leaving my network. Source Addresses, Destination Addresses as well as the code in the packets.
I used "Ethereal for windows. Then I decided I needed a good deal more filtering and firepower and found a HUGE PLETHORA of Linux Code already out there that did the same thing.
Logged Every Tidbit of information (even caught my son's PC going to porn sites) bugger was smart and cleared his cache and cookies so I couldnt find it..
What is all this about? Well.. I found that nothing out of the ordinary was leaving my machine when I played EQ. I watched the Sync Packets go across, and even though I am NOT A CODER ( shall probably have to repeat that again later) I am however an accomplished Network Developer.
I can read SOME code, and understand a good bit of it. There IS a way to filter OUTBOUND traffic containing specific key generators that are transmitted through each packet.
I did NOT find anything out of the ordinary on the data leaving my PC to my Game Server other than the Sync Packets. (for those not understanding the game engine dynamics, those are the packets that give you position information to the server so that everyones position is correct, they are quite small.)
* UNLESS *, SOE was smart and put their "Imaginary So Far" key sniffer KEY SNIFFING into that Sync Packet, then I do not see how Locating the KEY, closing down the Key sniffer and loading that Key into SEQ is going to get detected.
My Suggestion, (as I am NOT A CODER), is to take a look at the data LEAVING your computers/networks and check the packets. Maybe one of you coding guru's can decypher something more.
I know its not much help for the current delemna of Keys Sniffer Detection, but it may help is some benign way.
Thanks for at least listening.
QuerySEQ
I used a few packet sniffers and port checkers to watch all the traffic coming into and leaving my network. Source Addresses, Destination Addresses as well as the code in the packets.
I used "Ethereal for windows. Then I decided I needed a good deal more filtering and firepower and found a HUGE PLETHORA of Linux Code already out there that did the same thing.
Logged Every Tidbit of information (even caught my son's PC going to porn sites) bugger was smart and cleared his cache and cookies so I couldnt find it..
What is all this about? Well.. I found that nothing out of the ordinary was leaving my machine when I played EQ. I watched the Sync Packets go across, and even though I am NOT A CODER ( shall probably have to repeat that again later) I am however an accomplished Network Developer.
I can read SOME code, and understand a good bit of it. There IS a way to filter OUTBOUND traffic containing specific key generators that are transmitted through each packet.
I did NOT find anything out of the ordinary on the data leaving my PC to my Game Server other than the Sync Packets. (for those not understanding the game engine dynamics, those are the packets that give you position information to the server so that everyones position is correct, they are quite small.)
* UNLESS *, SOE was smart and put their "Imaginary So Far" key sniffer KEY SNIFFING into that Sync Packet, then I do not see how Locating the KEY, closing down the Key sniffer and loading that Key into SEQ is going to get detected.
My Suggestion, (as I am NOT A CODER), is to take a look at the data LEAVING your computers/networks and check the packets. Maybe one of you coding guru's can decypher something more.
I know its not much help for the current delemna of Keys Sniffer Detection, but it may help is some benign way.
Thanks for at least listening.
QuerySEQ