Results 1 to 19 of 19

Thread: Auth code help.

  1. #1
    Join Date
    Jan 2012
    Posts
    915
    Mentioned
    13 Post(s)
    Quoted
    87 Post(s)

    Default Auth code help.

    I'm needing some help with an auth code that i need for my Soul Wars script.


    I'm going to sell it on Scythe, and I don't want it to be leaked. (This is also for LaakeRules)

    If Anyone could get me a tutorial, or an auth code generator, That would be great! (I would prefer a tutorial on how to make them.)



    Thanks in advance!

    ~Troll

  2. #2
    Join Date
    Feb 2011
    Location
    The Future.
    Posts
    5,600
    Mentioned
    396 Post(s)
    Quoted
    1598 Post(s)

    Default

    And how exactly do you plan to "Auth" a script which is a simple "text file"??

    Even RC6 Encryption couldn't help you do that. You'd have to obfuscate the entire script manually and hope that someone smart enough doesn't de-ob it and share it with the world.. or else write the SRL include into a DLL file along with your Script and distribute a DLL version of your script.

    Authing it atm.. not a chance.
    I am Ggzz..
    Hackintosher

  3. #3
    Join Date
    Jan 2012
    Posts
    915
    Mentioned
    13 Post(s)
    Quoted
    87 Post(s)

  4. #4
    Join Date
    Feb 2006
    Location
    Tracy/Davis, California
    Posts
    12,631
    Mentioned
    135 Post(s)
    Quoted
    418 Post(s)

    Default

    There is talk on SSRL boards etc about this.
    Currently there are no very good ways to keep a script protected.
    You can talk to Hamtaro about the kind of protection he uses for this: http://sythe.org/showthread.php?t=1316281

    But there is really no way to protect a script from sharing/leaking right now. Most things can just be edited/removed easily.

  5. #5
    Join Date
    Nov 2011
    Location
    Turn Around...
    Posts
    528
    Mentioned
    1 Post(s)
    Quoted
    44 Post(s)

    Default

    true its just slowing them down. The person who i learned from is Cruzin
    We are all born ignorant, but one must work hard to remain stupid. - Benjamin Franklin

  6. #6
    Join Date
    Feb 2006
    Location
    Aussie
    Posts
    937
    Mentioned
    0 Post(s)
    Quoted
    0 Post(s)

    Default

    What happened to the obfuscating that I think star blaster used to do on scar scripts?

  7. #7
    Join Date
    Feb 2006
    Location
    Tracy/Davis, California
    Posts
    12,631
    Mentioned
    135 Post(s)
    Quoted
    418 Post(s)

    Default

    Markus still obs scripts for people.
    But obing alone is not enough.
    People can just copy/paste the obfuscation.

    Best you can do now is auth + obfuscation.
    Along with the auth/pass being checked for multiple IPs/Multiple usage at same time.

    And still (even if obbed) it can be removed (and it was for SB's scripts). But it's pretty effective.

  8. #8
    Join Date
    Feb 2006
    Location
    Aussie
    Posts
    937
    Mentioned
    0 Post(s)
    Quoted
    0 Post(s)

    Default

    Yeah, it wasn't too hard to build an auth system with scar though, simple php really. You can't really do anything to stop thieves anyway. If people want it bad enough, they'll get it.

  9. #9
    Join Date
    Feb 2012
    Posts
    93
    Mentioned
    0 Post(s)
    Quoted
    0 Post(s)

    Default

    This makes it pretty rediculous that some simbascripters sell the same script multiple times to some players so they can use use more than one account xD

  10. #10
    Join Date
    Dec 2006
    Location
    Program TEXAS home of AUTOERS
    Posts
    7,934
    Mentioned
    26 Post(s)
    Quoted
    237 Post(s)

    Default

    Quote Originally Posted by Jagex_Fagex View Post
    Yeah, it wasn't too hard to build an auth system with scar though, simple php really. You can't really do anything to stop thieves anyway. If people want it bad enough, they'll get it.
    Indeed I remember I had made one for SCAR, but I am pretty sure there is a way for SIMBA.

  11. #11
    Join Date
    Feb 2011
    Location
    Earth
    Posts
    1,784
    Mentioned
    1 Post(s)
    Quoted
    0 Post(s)

    Default

    Nothing can ever be kept private, if there is something that someone wants for free it is possible for them to get to it.

    Currently: Working on Defending&Attacking in my Castle-Wars Script
    Project Rebuild: 90M/170M

  12. #12
    Join Date
    Oct 2008
    Posts
    500
    Mentioned
    1 Post(s)
    Quoted
    0 Post(s)

    Default

    I think the main situation here is keeping the 12 year old kids from distributing your code.

    Auth system/ obbing would help with that tremedously.

  13. #13
    Join Date
    Sep 2007
    Location
    British Columbia, Canada
    Posts
    4,047
    Mentioned
    1 Post(s)
    Quoted
    2 Post(s)

    Default

    Manual obfuscation isn't bad, for example
    Simba Code:
    Function FCSS( CT: TPointArray; CutOff, Rad: Integer; SP, EP: Tpoint; T: Boolean): TPointArray;
    Var
      TPA: TPointArray;
      ATPA: T2DPointArray;
    Begin
      TPA := HDYS( CT, SP, EP, T);
      If Length( TPA) < 1 Then
        Exit;
      ATPA := TPAToATPA( TPA, Rad);
      SortATPASize( ATPA, True);
      If CutOff > 0 Then
        SetArrayLength( ATPA, CutOff);
      Result := ATPAToTPA( ATPA);
    End;

    Var
      LD: Boolean;

    Function WZNI: Integer;
    Begin
      If Length( HDYS( DeAuth( 1), Point( MSX1, MSY1), Point( MSX2, 35), True)) > 260 Then
        Result := 1;
      If Length( HDYS( DeAuth( 1), Point( 415, 30), Point( 500, 90), True)) > 200 Then
      Begin
        If Length( HDYS( DeAuth( 5), Point( MMX1, MMY1), Point( MMX2, MMY2), True)) < 1500 Then
          Result := 2
        Else
          Result := 3;
      End;
    End;

    Function DN: TPoint;
    Begin
      Result := PtToCoord( PolToPt( 90, 5, False, Point( MiddleTPA( FCSS( DeAuth( 2), 0, 5, CSP, CEP, False)).X, MiddleTPA( FCSS( DeAuth( 9), 0, 5, CSP, CEP, False)).Y)), MMCC);
      Writeln( CoordToStr( Result));
    End;

    Function DZNI: TPoint;
    Label
      Retry,
      JDQ;
    Var
      SC: TPoint;
      TTPA: TPointArray;
    Begin
      If Not WZNI = 1 Then
        Exit;
      Retry:
        Flag;
        TTPA := FCSS( DeAuth( 2), 0, 5, CSP, CEP, False);
        If LD Then
          SC := Point( 215, 0 - Random( 30))
        Else
          SC := Point( 135, 5 + Random( 30));
        SortTPAEx( TTPA, PolToPt( SC.X, 75, False, MMCC));
        Result:= PolToPt( 90, SC.Y, False, TTPA[ 0]);
        If PtToHyp( Result, MMCC) < 20 Then
          GOTO JDQ;
        MMM( ToMM( PolToPt( 0, RandomRange( -5, 5), False, PolToPt( 90, SC.Y, False, TTPA[ 0]))), 1);
        Case Random( 2) of
          0: Wait( PtToHyp( Result, MMCC) * Random( 50));
        End;
        Case Random( 2) Of
          0: MakeCompass( PtToPol( 0, False, Result, MMCC));
        End;
        //Case Random( 2) of
        //  0: Wait( PtToHyp( Result, MMCC) * Random( 20));
        //End;
        GOTO Retry;
      JDQ:
        Exit;
    End;

    If you make it like that (just have weird function names) and that should be enough.

  14. #14
    Join Date
    Oct 2008
    Posts
    500
    Mentioned
    1 Post(s)
    Quoted
    0 Post(s)

    Default

    Obfuscation can be copy/pasted.

    I agree it is powerful in itself, but auth would need to be implemented as well.

  15. #15
    Join Date
    Jan 2012
    Posts
    34
    Mentioned
    0 Post(s)
    Quoted
    2 Post(s)

    Default

    I'm going to make a free soulwars script, is that allowed ?

  16. #16
    Join Date
    Nov 2006
    Posts
    2,369
    Mentioned
    4 Post(s)
    Quoted
    78 Post(s)

    Default

    Quote Originally Posted by mastah View Post
    I'm going to make a free soulwars script, is that allowed ?
    Of course it is.
    Quote Originally Posted by DeSnob View Post
    ETA's don't exist in SRL like they did in other communities. Want a faster update? Help out with updating, otherwise just gotta wait it out.

  17. #17
    Join Date
    Jul 2008
    Location
    NSW, Australia
    Posts
    881
    Mentioned
    0 Post(s)
    Quoted
    3 Post(s)

    Default

    What about setting up a system that will request parts of obfuscated code into a .txt from a Server that uses a username and password and then having it write code into another .txt that will be used straight after its called to delete the obfuscated code .txt
    So they will only ever have parts of the real code at one give time and this could be made to use random .txt names and executed in random order along with dummy .txts created
    That way it will be almost impossible for them

  18. #18
    Join Date
    Feb 2007
    Location
    Het ademt zwaar en moedeloos vannacht.
    Posts
    7,211
    Mentioned
    26 Post(s)
    Quoted
    72 Post(s)

    Default

    That's what you say, but in practice it's easy. Something like Wireshark can sniff the txt, and you could interrupt the script so when it saves the txt it terminates (you could even modify Simba to do so).
    I made a new script, check it out!.

  19. #19
    Join Date
    Jul 2008
    Location
    NSW, Australia
    Posts
    881
    Mentioned
    0 Post(s)
    Quoted
    3 Post(s)

    Default

    Quote Originally Posted by Markus View Post
    That's what you say, but in practice it's easy. Something like Wireshark can sniff the txt, and you could interrupt the script so when it saves the txt it terminates (you could even modify Simba to do so).
    DAYYME!
    That's messed up, what if it it sent the server a random number and other numbers of to tell it where to place the code in the .txt and the server uploaded a .txt with Extra gibberish obfuscated code at the top or in the middle or at the bottom of the real obfs code etc that would not compile if copy and pasted and the scripts numbers it generated where used to find the location of the real code to be read by simba for execution?

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •