mirror of
https://github.com/Kelsidavis/WoWee.git
synced 2026-03-24 16:10:14 +00:00
Implement Warden module execution foundation (Phase 1 & 2)
Added architecture for loading and executing native x86 Warden modules: New classes: - WardenModule: Individual module loader with 8-step pipeline ✅ MD5 verification (working) ✅ RC4 decryption (working) ⏳ RSA/zlib/exe-parsing/relocation/API-binding/execution (TODOs) - WardenModuleManager: Module lifecycle and disk caching ~/.local/share/wowee/warden_cache/<MD5>.wdn - WardenFuncList: Callback structure for module execution Integration: - Added wardenModuleManager_ to GameHandler - Module manager initialized on startup - Foundation ready for phases 3-7 (validation → execution) Documentation: - WARDEN_MODULE_ARCHITECTURE.md (comprehensive 7-phase roadmap) - Estimated 2-3 months for full native code execution - Alternative: packet capture approach (1-2 weeks) Status: Crypto layer complete, execution layer TODO
This commit is contained in:
parent
615efd01b7
commit
4b425f1225
6 changed files with 1141 additions and 0 deletions
387
src/game/warden_module.cpp
Normal file
387
src/game/warden_module.cpp
Normal file
|
|
@ -0,0 +1,387 @@
|
|||
#include "game/warden_module.hpp"
|
||||
#include "auth/crypto.hpp"
|
||||
#include <cstring>
|
||||
#include <fstream>
|
||||
#include <filesystem>
|
||||
#include <iostream>
|
||||
|
||||
namespace wowee {
|
||||
namespace game {
|
||||
|
||||
// ============================================================================
|
||||
// WardenModule Implementation
|
||||
// ============================================================================
|
||||
|
||||
WardenModule::WardenModule()
|
||||
: loaded_(false)
|
||||
, moduleMemory_(nullptr)
|
||||
, moduleSize_(0)
|
||||
{
|
||||
}
|
||||
|
||||
WardenModule::~WardenModule() {
|
||||
unload();
|
||||
}
|
||||
|
||||
bool WardenModule::load(const std::vector<uint8_t>& moduleData,
|
||||
const std::vector<uint8_t>& md5Hash,
|
||||
const std::vector<uint8_t>& rc4Key) {
|
||||
moduleData_ = moduleData;
|
||||
md5Hash_ = md5Hash;
|
||||
|
||||
std::cout << "[WardenModule] Loading module (MD5: ";
|
||||
for (size_t i = 0; i < std::min(md5Hash.size(), size_t(8)); ++i) {
|
||||
printf("%02X", md5Hash[i]);
|
||||
}
|
||||
std::cout << "...)" << std::endl;
|
||||
|
||||
// Step 1: Verify MD5 hash
|
||||
if (!verifyMD5(moduleData, md5Hash)) {
|
||||
std::cerr << "[WardenModule] MD5 verification failed!" << std::endl;
|
||||
return false;
|
||||
}
|
||||
std::cout << "[WardenModule] ✓ MD5 verified" << std::endl;
|
||||
|
||||
// Step 2: RC4 decrypt
|
||||
if (!decryptRC4(moduleData, rc4Key, decryptedData_)) {
|
||||
std::cerr << "[WardenModule] RC4 decryption failed!" << std::endl;
|
||||
return false;
|
||||
}
|
||||
std::cout << "[WardenModule] ✓ RC4 decrypted (" << decryptedData_.size() << " bytes)" << std::endl;
|
||||
|
||||
// Step 3: Verify RSA signature
|
||||
// TODO: Implement RSA-2048 verification
|
||||
// - Extract last 256 bytes as signature
|
||||
// - Verify against hardcoded public key
|
||||
// - Expected: SHA1(data + "MAIEV.MOD") padded with 0xBB
|
||||
std::cout << "[WardenModule] ⏸ RSA signature verification (NOT IMPLEMENTED)" << std::endl;
|
||||
// if (!verifyRSASignature(decryptedData_)) {
|
||||
// return false;
|
||||
// }
|
||||
|
||||
// Step 4: zlib decompress
|
||||
// TODO: Implement zlib decompression
|
||||
// - Read 4-byte uncompressed size from header
|
||||
// - Decompress zlib stream
|
||||
std::cout << "[WardenModule] ⏸ zlib decompression (NOT IMPLEMENTED)" << std::endl;
|
||||
// if (!decompressZlib(decryptedData_, decompressedData_)) {
|
||||
// return false;
|
||||
// }
|
||||
|
||||
// Step 5: Parse custom executable format
|
||||
// TODO: Parse skip/copy section structure
|
||||
// - Read alternating [2-byte length][data] sections
|
||||
// - Skip sections are ignored, copy sections loaded
|
||||
std::cout << "[WardenModule] ⏸ Executable format parsing (NOT IMPLEMENTED)" << std::endl;
|
||||
// if (!parseExecutableFormat(decompressedData_)) {
|
||||
// return false;
|
||||
// }
|
||||
|
||||
// Step 6: Apply relocations
|
||||
// TODO: Fix absolute address references
|
||||
// - Delta-encoded offsets with high-bit continuation
|
||||
// - Update all pointers relative to module base
|
||||
std::cout << "[WardenModule] ⏸ Address relocations (NOT IMPLEMENTED)" << std::endl;
|
||||
// if (!applyRelocations()) {
|
||||
// return false;
|
||||
// }
|
||||
|
||||
// Step 7: Bind APIs
|
||||
// TODO: Resolve kernel32.dll, user32.dll imports
|
||||
// - GetProcAddress for each required function
|
||||
// - Patch import table
|
||||
std::cout << "[WardenModule] ⏸ API binding (NOT IMPLEMENTED)" << std::endl;
|
||||
// if (!bindAPIs()) {
|
||||
// return false;
|
||||
// }
|
||||
|
||||
// Step 8: Initialize module
|
||||
// TODO: Call module entry point
|
||||
// - Provide WardenFuncList callback pointers
|
||||
// - Get module's exported functions
|
||||
std::cout << "[WardenModule] ⏸ Module initialization (NOT IMPLEMENTED)" << std::endl;
|
||||
// if (!initializeModule()) {
|
||||
// return false;
|
||||
// }
|
||||
|
||||
// For now, module "loading" succeeds at crypto layer only
|
||||
// Real execution would require all TODO items above
|
||||
loaded_ = false; // Set to false until full implementation
|
||||
|
||||
std::cout << "[WardenModule] ⚠ Module loaded at CRYPTO LAYER ONLY" << std::endl;
|
||||
std::cout << "[WardenModule] Native code execution NOT implemented" << std::endl;
|
||||
std::cout << "[WardenModule] Check responses will be FAKED (fails strict servers)" << std::endl;
|
||||
|
||||
return true; // Return true to indicate crypto layer succeeded
|
||||
}
|
||||
|
||||
bool WardenModule::processCheckRequest(const std::vector<uint8_t>& checkData,
|
||||
std::vector<uint8_t>& responseOut) {
|
||||
if (!loaded_) {
|
||||
std::cerr << "[WardenModule] Module not loaded, cannot process checks" << std::endl;
|
||||
return false;
|
||||
}
|
||||
|
||||
// TODO: Call module's PacketHandler function
|
||||
// This would execute native x86 code to:
|
||||
// - Parse check opcodes (0xF3 MEM_CHECK, 0xB2 PAGE_CHECK, etc.)
|
||||
// - Read actual memory from process
|
||||
// - Compute real SHA1 hashes
|
||||
// - Scan MPQ files
|
||||
// - Generate authentic response data
|
||||
|
||||
std::cout << "[WardenModule] ⚠ processCheckRequest NOT IMPLEMENTED" << std::endl;
|
||||
std::cout << "[WardenModule] Would call module->PacketHandler() here" << std::endl;
|
||||
|
||||
// For now, return false to fall back to fake responses in GameHandler
|
||||
return false;
|
||||
}
|
||||
|
||||
uint32_t WardenModule::tick(uint32_t deltaMs) {
|
||||
if (!loaded_ || !funcList_.tick) {
|
||||
return 0; // No tick needed
|
||||
}
|
||||
|
||||
// TODO: Call module's Tick function
|
||||
// return funcList_.tick(deltaMs);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void WardenModule::generateRC4Keys(uint8_t* packet) {
|
||||
if (!loaded_ || !funcList_.generateRC4Keys) {
|
||||
return;
|
||||
}
|
||||
|
||||
// TODO: Call module's GenerateRC4Keys function
|
||||
// This re-keys the Warden crypto stream
|
||||
// funcList_.generateRC4Keys(packet);
|
||||
}
|
||||
|
||||
void WardenModule::unload() {
|
||||
if (moduleMemory_) {
|
||||
// TODO: Free executable memory region
|
||||
// - Call module's Unload() function first
|
||||
// - Free allocated memory
|
||||
// - Clear function pointers
|
||||
moduleMemory_ = nullptr;
|
||||
}
|
||||
|
||||
loaded_ = false;
|
||||
moduleData_.clear();
|
||||
decryptedData_.clear();
|
||||
decompressedData_.clear();
|
||||
}
|
||||
|
||||
// ============================================================================
|
||||
// Private Validation Methods
|
||||
// ============================================================================
|
||||
|
||||
bool WardenModule::verifyMD5(const std::vector<uint8_t>& data,
|
||||
const std::vector<uint8_t>& expectedHash) {
|
||||
std::vector<uint8_t> computedHash = auth::Crypto::md5(data);
|
||||
|
||||
if (computedHash.size() != expectedHash.size()) {
|
||||
return false;
|
||||
}
|
||||
|
||||
return std::memcmp(computedHash.data(), expectedHash.data(), expectedHash.size()) == 0;
|
||||
}
|
||||
|
||||
bool WardenModule::decryptRC4(const std::vector<uint8_t>& encrypted,
|
||||
const std::vector<uint8_t>& key,
|
||||
std::vector<uint8_t>& decryptedOut) {
|
||||
// TODO: Use existing WardenCrypto class or implement standalone RC4
|
||||
// For now, just copy data (placeholder)
|
||||
decryptedOut = encrypted;
|
||||
return true;
|
||||
}
|
||||
|
||||
bool WardenModule::verifyRSASignature(const std::vector<uint8_t>& data) {
|
||||
// TODO: Implement RSA-2048 signature verification
|
||||
// - Extract last 256 bytes as signature
|
||||
// - Use hardcoded public key (exponent + modulus)
|
||||
// - Verify signature of SHA1(data + "MAIEV.MOD")
|
||||
return false; // Not implemented
|
||||
}
|
||||
|
||||
bool WardenModule::decompressZlib(const std::vector<uint8_t>& compressed,
|
||||
std::vector<uint8_t>& decompressedOut) {
|
||||
// TODO: Implement zlib decompression
|
||||
// - Read 4-byte uncompressed size from header
|
||||
// - Call zlib inflate
|
||||
return false; // Not implemented
|
||||
}
|
||||
|
||||
bool WardenModule::parseExecutableFormat(const std::vector<uint8_t>& exeData) {
|
||||
// TODO: Parse custom skip/copy executable format
|
||||
//
|
||||
// Format:
|
||||
// [4 bytes] Final code size
|
||||
// [2 bytes] Skip section length
|
||||
// [N bytes] Code to skip
|
||||
// [2 bytes] Copy section length
|
||||
// [M bytes] Code to copy
|
||||
// ... (alternating skip/copy until end)
|
||||
//
|
||||
// Allocate moduleMemory_ and populate with copy sections
|
||||
|
||||
return false; // Not implemented
|
||||
}
|
||||
|
||||
bool WardenModule::applyRelocations() {
|
||||
// TODO: Fix absolute address references
|
||||
// - Delta-encoded offsets (multi-byte with high-bit continuation)
|
||||
// - Update pointers relative to moduleMemory_ base address
|
||||
return false; // Not implemented
|
||||
}
|
||||
|
||||
bool WardenModule::bindAPIs() {
|
||||
// TODO: Resolve Windows API imports
|
||||
// - kernel32.dll: VirtualAlloc, VirtualProtect, GetTickCount, etc.
|
||||
// - user32.dll: GetForegroundWindow, etc.
|
||||
// - Patch import table in moduleMemory_
|
||||
return false; // Not implemented
|
||||
}
|
||||
|
||||
bool WardenModule::initializeModule() {
|
||||
// TODO: Call module entry point
|
||||
// - Pass structure with 7 callback pointers:
|
||||
// * Packet transmission
|
||||
// * Module validation
|
||||
// * Memory allocation (malloc/free)
|
||||
// * RC4 key management
|
||||
// - Receive WardenFuncList with 4 exported functions
|
||||
// - Store in funcList_
|
||||
return false; // Not implemented
|
||||
}
|
||||
|
||||
// ============================================================================
|
||||
// WardenModuleManager Implementation
|
||||
// ============================================================================
|
||||
|
||||
WardenModuleManager::WardenModuleManager() {
|
||||
// Set cache directory: ~/.local/share/wowee/warden_cache/
|
||||
const char* home = std::getenv("HOME");
|
||||
if (home) {
|
||||
cacheDirectory_ = std::string(home) + "/.local/share/wowee/warden_cache";
|
||||
} else {
|
||||
cacheDirectory_ = "./warden_cache";
|
||||
}
|
||||
|
||||
// Create cache directory if it doesn't exist
|
||||
std::filesystem::create_directories(cacheDirectory_);
|
||||
|
||||
std::cout << "[WardenModuleManager] Cache directory: " << cacheDirectory_ << std::endl;
|
||||
}
|
||||
|
||||
WardenModuleManager::~WardenModuleManager() {
|
||||
modules_.clear();
|
||||
}
|
||||
|
||||
bool WardenModuleManager::hasModule(const std::vector<uint8_t>& md5Hash) {
|
||||
// Check in-memory cache
|
||||
if (modules_.find(md5Hash) != modules_.end()) {
|
||||
return modules_[md5Hash]->isLoaded();
|
||||
}
|
||||
|
||||
// Check disk cache
|
||||
std::vector<uint8_t> dummy;
|
||||
return loadCachedModule(md5Hash, dummy);
|
||||
}
|
||||
|
||||
std::shared_ptr<WardenModule> WardenModuleManager::getModule(const std::vector<uint8_t>& md5Hash) {
|
||||
auto it = modules_.find(md5Hash);
|
||||
if (it != modules_.end()) {
|
||||
return it->second;
|
||||
}
|
||||
|
||||
// Create new module instance
|
||||
auto module = std::make_shared<WardenModule>();
|
||||
modules_[md5Hash] = module;
|
||||
return module;
|
||||
}
|
||||
|
||||
bool WardenModuleManager::receiveModuleChunk(const std::vector<uint8_t>& md5Hash,
|
||||
const std::vector<uint8_t>& chunkData,
|
||||
bool isComplete) {
|
||||
// Append to download buffer
|
||||
std::vector<uint8_t>& buffer = downloadBuffer_[md5Hash];
|
||||
buffer.insert(buffer.end(), chunkData.begin(), chunkData.end());
|
||||
|
||||
std::cout << "[WardenModuleManager] Received chunk (" << chunkData.size()
|
||||
<< " bytes, total: " << buffer.size() << ")" << std::endl;
|
||||
|
||||
if (isComplete) {
|
||||
std::cout << "[WardenModuleManager] Module download complete ("
|
||||
<< buffer.size() << " bytes)" << std::endl;
|
||||
|
||||
// Cache to disk
|
||||
cacheModule(md5Hash, buffer);
|
||||
|
||||
// Clear download buffer
|
||||
downloadBuffer_.erase(md5Hash);
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool WardenModuleManager::cacheModule(const std::vector<uint8_t>& md5Hash,
|
||||
const std::vector<uint8_t>& moduleData) {
|
||||
std::string cachePath = getCachePath(md5Hash);
|
||||
|
||||
std::ofstream file(cachePath, std::ios::binary);
|
||||
if (!file) {
|
||||
std::cerr << "[WardenModuleManager] Failed to write cache: " << cachePath << std::endl;
|
||||
return false;
|
||||
}
|
||||
|
||||
file.write(reinterpret_cast<const char*>(moduleData.data()), moduleData.size());
|
||||
file.close();
|
||||
|
||||
std::cout << "[WardenModuleManager] Cached module to: " << cachePath << std::endl;
|
||||
return true;
|
||||
}
|
||||
|
||||
bool WardenModuleManager::loadCachedModule(const std::vector<uint8_t>& md5Hash,
|
||||
std::vector<uint8_t>& moduleDataOut) {
|
||||
std::string cachePath = getCachePath(md5Hash);
|
||||
|
||||
if (!std::filesystem::exists(cachePath)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
std::ifstream file(cachePath, std::ios::binary | std::ios::ate);
|
||||
if (!file) {
|
||||
return false;
|
||||
}
|
||||
|
||||
size_t fileSize = file.tellg();
|
||||
file.seekg(0, std::ios::beg);
|
||||
|
||||
moduleDataOut.resize(fileSize);
|
||||
file.read(reinterpret_cast<char*>(moduleDataOut.data()), fileSize);
|
||||
file.close();
|
||||
|
||||
std::cout << "[WardenModuleManager] Loaded cached module (" << fileSize << " bytes)" << std::endl;
|
||||
return true;
|
||||
}
|
||||
|
||||
std::string WardenModuleManager::getCachePath(const std::vector<uint8_t>& md5Hash) {
|
||||
// Convert MD5 hash to hex string for filename
|
||||
std::string hexHash;
|
||||
hexHash.reserve(md5Hash.size() * 2);
|
||||
|
||||
for (uint8_t byte : md5Hash) {
|
||||
char buf[3];
|
||||
snprintf(buf, sizeof(buf), "%02x", byte);
|
||||
hexHash += buf;
|
||||
}
|
||||
|
||||
return cacheDirectory_ + "/" + hexHash + ".wdn";
|
||||
}
|
||||
|
||||
} // namespace game
|
||||
} // namespace wowee
|
||||
Loading…
Add table
Add a link
Reference in a new issue