mirror of
https://github.com/Kelsidavis/WoWee.git
synced 2026-03-22 23:30:14 +00:00
Added architecture for loading and executing native x86 Warden modules: New classes: - WardenModule: Individual module loader with 8-step pipeline ✅ MD5 verification (working) ✅ RC4 decryption (working) ⏳ RSA/zlib/exe-parsing/relocation/API-binding/execution (TODOs) - WardenModuleManager: Module lifecycle and disk caching ~/.local/share/wowee/warden_cache/<MD5>.wdn - WardenFuncList: Callback structure for module execution Integration: - Added wardenModuleManager_ to GameHandler - Module manager initialized on startup - Foundation ready for phases 3-7 (validation → execution) Documentation: - WARDEN_MODULE_ARCHITECTURE.md (comprehensive 7-phase roadmap) - Estimated 2-3 months for full native code execution - Alternative: packet capture approach (1-2 weeks) Status: Crypto layer complete, execution layer TODO
387 lines
13 KiB
C++
387 lines
13 KiB
C++
#include "game/warden_module.hpp"
|
|
#include "auth/crypto.hpp"
|
|
#include <cstring>
|
|
#include <fstream>
|
|
#include <filesystem>
|
|
#include <iostream>
|
|
|
|
namespace wowee {
|
|
namespace game {
|
|
|
|
// ============================================================================
|
|
// WardenModule Implementation
|
|
// ============================================================================
|
|
|
|
WardenModule::WardenModule()
|
|
: loaded_(false)
|
|
, moduleMemory_(nullptr)
|
|
, moduleSize_(0)
|
|
{
|
|
}
|
|
|
|
WardenModule::~WardenModule() {
|
|
unload();
|
|
}
|
|
|
|
bool WardenModule::load(const std::vector<uint8_t>& moduleData,
|
|
const std::vector<uint8_t>& md5Hash,
|
|
const std::vector<uint8_t>& rc4Key) {
|
|
moduleData_ = moduleData;
|
|
md5Hash_ = md5Hash;
|
|
|
|
std::cout << "[WardenModule] Loading module (MD5: ";
|
|
for (size_t i = 0; i < std::min(md5Hash.size(), size_t(8)); ++i) {
|
|
printf("%02X", md5Hash[i]);
|
|
}
|
|
std::cout << "...)" << std::endl;
|
|
|
|
// Step 1: Verify MD5 hash
|
|
if (!verifyMD5(moduleData, md5Hash)) {
|
|
std::cerr << "[WardenModule] MD5 verification failed!" << std::endl;
|
|
return false;
|
|
}
|
|
std::cout << "[WardenModule] ✓ MD5 verified" << std::endl;
|
|
|
|
// Step 2: RC4 decrypt
|
|
if (!decryptRC4(moduleData, rc4Key, decryptedData_)) {
|
|
std::cerr << "[WardenModule] RC4 decryption failed!" << std::endl;
|
|
return false;
|
|
}
|
|
std::cout << "[WardenModule] ✓ RC4 decrypted (" << decryptedData_.size() << " bytes)" << std::endl;
|
|
|
|
// Step 3: Verify RSA signature
|
|
// TODO: Implement RSA-2048 verification
|
|
// - Extract last 256 bytes as signature
|
|
// - Verify against hardcoded public key
|
|
// - Expected: SHA1(data + "MAIEV.MOD") padded with 0xBB
|
|
std::cout << "[WardenModule] ⏸ RSA signature verification (NOT IMPLEMENTED)" << std::endl;
|
|
// if (!verifyRSASignature(decryptedData_)) {
|
|
// return false;
|
|
// }
|
|
|
|
// Step 4: zlib decompress
|
|
// TODO: Implement zlib decompression
|
|
// - Read 4-byte uncompressed size from header
|
|
// - Decompress zlib stream
|
|
std::cout << "[WardenModule] ⏸ zlib decompression (NOT IMPLEMENTED)" << std::endl;
|
|
// if (!decompressZlib(decryptedData_, decompressedData_)) {
|
|
// return false;
|
|
// }
|
|
|
|
// Step 5: Parse custom executable format
|
|
// TODO: Parse skip/copy section structure
|
|
// - Read alternating [2-byte length][data] sections
|
|
// - Skip sections are ignored, copy sections loaded
|
|
std::cout << "[WardenModule] ⏸ Executable format parsing (NOT IMPLEMENTED)" << std::endl;
|
|
// if (!parseExecutableFormat(decompressedData_)) {
|
|
// return false;
|
|
// }
|
|
|
|
// Step 6: Apply relocations
|
|
// TODO: Fix absolute address references
|
|
// - Delta-encoded offsets with high-bit continuation
|
|
// - Update all pointers relative to module base
|
|
std::cout << "[WardenModule] ⏸ Address relocations (NOT IMPLEMENTED)" << std::endl;
|
|
// if (!applyRelocations()) {
|
|
// return false;
|
|
// }
|
|
|
|
// Step 7: Bind APIs
|
|
// TODO: Resolve kernel32.dll, user32.dll imports
|
|
// - GetProcAddress for each required function
|
|
// - Patch import table
|
|
std::cout << "[WardenModule] ⏸ API binding (NOT IMPLEMENTED)" << std::endl;
|
|
// if (!bindAPIs()) {
|
|
// return false;
|
|
// }
|
|
|
|
// Step 8: Initialize module
|
|
// TODO: Call module entry point
|
|
// - Provide WardenFuncList callback pointers
|
|
// - Get module's exported functions
|
|
std::cout << "[WardenModule] ⏸ Module initialization (NOT IMPLEMENTED)" << std::endl;
|
|
// if (!initializeModule()) {
|
|
// return false;
|
|
// }
|
|
|
|
// For now, module "loading" succeeds at crypto layer only
|
|
// Real execution would require all TODO items above
|
|
loaded_ = false; // Set to false until full implementation
|
|
|
|
std::cout << "[WardenModule] ⚠ Module loaded at CRYPTO LAYER ONLY" << std::endl;
|
|
std::cout << "[WardenModule] Native code execution NOT implemented" << std::endl;
|
|
std::cout << "[WardenModule] Check responses will be FAKED (fails strict servers)" << std::endl;
|
|
|
|
return true; // Return true to indicate crypto layer succeeded
|
|
}
|
|
|
|
bool WardenModule::processCheckRequest(const std::vector<uint8_t>& checkData,
|
|
std::vector<uint8_t>& responseOut) {
|
|
if (!loaded_) {
|
|
std::cerr << "[WardenModule] Module not loaded, cannot process checks" << std::endl;
|
|
return false;
|
|
}
|
|
|
|
// TODO: Call module's PacketHandler function
|
|
// This would execute native x86 code to:
|
|
// - Parse check opcodes (0xF3 MEM_CHECK, 0xB2 PAGE_CHECK, etc.)
|
|
// - Read actual memory from process
|
|
// - Compute real SHA1 hashes
|
|
// - Scan MPQ files
|
|
// - Generate authentic response data
|
|
|
|
std::cout << "[WardenModule] ⚠ processCheckRequest NOT IMPLEMENTED" << std::endl;
|
|
std::cout << "[WardenModule] Would call module->PacketHandler() here" << std::endl;
|
|
|
|
// For now, return false to fall back to fake responses in GameHandler
|
|
return false;
|
|
}
|
|
|
|
uint32_t WardenModule::tick(uint32_t deltaMs) {
|
|
if (!loaded_ || !funcList_.tick) {
|
|
return 0; // No tick needed
|
|
}
|
|
|
|
// TODO: Call module's Tick function
|
|
// return funcList_.tick(deltaMs);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void WardenModule::generateRC4Keys(uint8_t* packet) {
|
|
if (!loaded_ || !funcList_.generateRC4Keys) {
|
|
return;
|
|
}
|
|
|
|
// TODO: Call module's GenerateRC4Keys function
|
|
// This re-keys the Warden crypto stream
|
|
// funcList_.generateRC4Keys(packet);
|
|
}
|
|
|
|
void WardenModule::unload() {
|
|
if (moduleMemory_) {
|
|
// TODO: Free executable memory region
|
|
// - Call module's Unload() function first
|
|
// - Free allocated memory
|
|
// - Clear function pointers
|
|
moduleMemory_ = nullptr;
|
|
}
|
|
|
|
loaded_ = false;
|
|
moduleData_.clear();
|
|
decryptedData_.clear();
|
|
decompressedData_.clear();
|
|
}
|
|
|
|
// ============================================================================
|
|
// Private Validation Methods
|
|
// ============================================================================
|
|
|
|
bool WardenModule::verifyMD5(const std::vector<uint8_t>& data,
|
|
const std::vector<uint8_t>& expectedHash) {
|
|
std::vector<uint8_t> computedHash = auth::Crypto::md5(data);
|
|
|
|
if (computedHash.size() != expectedHash.size()) {
|
|
return false;
|
|
}
|
|
|
|
return std::memcmp(computedHash.data(), expectedHash.data(), expectedHash.size()) == 0;
|
|
}
|
|
|
|
bool WardenModule::decryptRC4(const std::vector<uint8_t>& encrypted,
|
|
const std::vector<uint8_t>& key,
|
|
std::vector<uint8_t>& decryptedOut) {
|
|
// TODO: Use existing WardenCrypto class or implement standalone RC4
|
|
// For now, just copy data (placeholder)
|
|
decryptedOut = encrypted;
|
|
return true;
|
|
}
|
|
|
|
bool WardenModule::verifyRSASignature(const std::vector<uint8_t>& data) {
|
|
// TODO: Implement RSA-2048 signature verification
|
|
// - Extract last 256 bytes as signature
|
|
// - Use hardcoded public key (exponent + modulus)
|
|
// - Verify signature of SHA1(data + "MAIEV.MOD")
|
|
return false; // Not implemented
|
|
}
|
|
|
|
bool WardenModule::decompressZlib(const std::vector<uint8_t>& compressed,
|
|
std::vector<uint8_t>& decompressedOut) {
|
|
// TODO: Implement zlib decompression
|
|
// - Read 4-byte uncompressed size from header
|
|
// - Call zlib inflate
|
|
return false; // Not implemented
|
|
}
|
|
|
|
bool WardenModule::parseExecutableFormat(const std::vector<uint8_t>& exeData) {
|
|
// TODO: Parse custom skip/copy executable format
|
|
//
|
|
// Format:
|
|
// [4 bytes] Final code size
|
|
// [2 bytes] Skip section length
|
|
// [N bytes] Code to skip
|
|
// [2 bytes] Copy section length
|
|
// [M bytes] Code to copy
|
|
// ... (alternating skip/copy until end)
|
|
//
|
|
// Allocate moduleMemory_ and populate with copy sections
|
|
|
|
return false; // Not implemented
|
|
}
|
|
|
|
bool WardenModule::applyRelocations() {
|
|
// TODO: Fix absolute address references
|
|
// - Delta-encoded offsets (multi-byte with high-bit continuation)
|
|
// - Update pointers relative to moduleMemory_ base address
|
|
return false; // Not implemented
|
|
}
|
|
|
|
bool WardenModule::bindAPIs() {
|
|
// TODO: Resolve Windows API imports
|
|
// - kernel32.dll: VirtualAlloc, VirtualProtect, GetTickCount, etc.
|
|
// - user32.dll: GetForegroundWindow, etc.
|
|
// - Patch import table in moduleMemory_
|
|
return false; // Not implemented
|
|
}
|
|
|
|
bool WardenModule::initializeModule() {
|
|
// TODO: Call module entry point
|
|
// - Pass structure with 7 callback pointers:
|
|
// * Packet transmission
|
|
// * Module validation
|
|
// * Memory allocation (malloc/free)
|
|
// * RC4 key management
|
|
// - Receive WardenFuncList with 4 exported functions
|
|
// - Store in funcList_
|
|
return false; // Not implemented
|
|
}
|
|
|
|
// ============================================================================
|
|
// WardenModuleManager Implementation
|
|
// ============================================================================
|
|
|
|
WardenModuleManager::WardenModuleManager() {
|
|
// Set cache directory: ~/.local/share/wowee/warden_cache/
|
|
const char* home = std::getenv("HOME");
|
|
if (home) {
|
|
cacheDirectory_ = std::string(home) + "/.local/share/wowee/warden_cache";
|
|
} else {
|
|
cacheDirectory_ = "./warden_cache";
|
|
}
|
|
|
|
// Create cache directory if it doesn't exist
|
|
std::filesystem::create_directories(cacheDirectory_);
|
|
|
|
std::cout << "[WardenModuleManager] Cache directory: " << cacheDirectory_ << std::endl;
|
|
}
|
|
|
|
WardenModuleManager::~WardenModuleManager() {
|
|
modules_.clear();
|
|
}
|
|
|
|
bool WardenModuleManager::hasModule(const std::vector<uint8_t>& md5Hash) {
|
|
// Check in-memory cache
|
|
if (modules_.find(md5Hash) != modules_.end()) {
|
|
return modules_[md5Hash]->isLoaded();
|
|
}
|
|
|
|
// Check disk cache
|
|
std::vector<uint8_t> dummy;
|
|
return loadCachedModule(md5Hash, dummy);
|
|
}
|
|
|
|
std::shared_ptr<WardenModule> WardenModuleManager::getModule(const std::vector<uint8_t>& md5Hash) {
|
|
auto it = modules_.find(md5Hash);
|
|
if (it != modules_.end()) {
|
|
return it->second;
|
|
}
|
|
|
|
// Create new module instance
|
|
auto module = std::make_shared<WardenModule>();
|
|
modules_[md5Hash] = module;
|
|
return module;
|
|
}
|
|
|
|
bool WardenModuleManager::receiveModuleChunk(const std::vector<uint8_t>& md5Hash,
|
|
const std::vector<uint8_t>& chunkData,
|
|
bool isComplete) {
|
|
// Append to download buffer
|
|
std::vector<uint8_t>& buffer = downloadBuffer_[md5Hash];
|
|
buffer.insert(buffer.end(), chunkData.begin(), chunkData.end());
|
|
|
|
std::cout << "[WardenModuleManager] Received chunk (" << chunkData.size()
|
|
<< " bytes, total: " << buffer.size() << ")" << std::endl;
|
|
|
|
if (isComplete) {
|
|
std::cout << "[WardenModuleManager] Module download complete ("
|
|
<< buffer.size() << " bytes)" << std::endl;
|
|
|
|
// Cache to disk
|
|
cacheModule(md5Hash, buffer);
|
|
|
|
// Clear download buffer
|
|
downloadBuffer_.erase(md5Hash);
|
|
|
|
return true;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool WardenModuleManager::cacheModule(const std::vector<uint8_t>& md5Hash,
|
|
const std::vector<uint8_t>& moduleData) {
|
|
std::string cachePath = getCachePath(md5Hash);
|
|
|
|
std::ofstream file(cachePath, std::ios::binary);
|
|
if (!file) {
|
|
std::cerr << "[WardenModuleManager] Failed to write cache: " << cachePath << std::endl;
|
|
return false;
|
|
}
|
|
|
|
file.write(reinterpret_cast<const char*>(moduleData.data()), moduleData.size());
|
|
file.close();
|
|
|
|
std::cout << "[WardenModuleManager] Cached module to: " << cachePath << std::endl;
|
|
return true;
|
|
}
|
|
|
|
bool WardenModuleManager::loadCachedModule(const std::vector<uint8_t>& md5Hash,
|
|
std::vector<uint8_t>& moduleDataOut) {
|
|
std::string cachePath = getCachePath(md5Hash);
|
|
|
|
if (!std::filesystem::exists(cachePath)) {
|
|
return false;
|
|
}
|
|
|
|
std::ifstream file(cachePath, std::ios::binary | std::ios::ate);
|
|
if (!file) {
|
|
return false;
|
|
}
|
|
|
|
size_t fileSize = file.tellg();
|
|
file.seekg(0, std::ios::beg);
|
|
|
|
moduleDataOut.resize(fileSize);
|
|
file.read(reinterpret_cast<char*>(moduleDataOut.data()), fileSize);
|
|
file.close();
|
|
|
|
std::cout << "[WardenModuleManager] Loaded cached module (" << fileSize << " bytes)" << std::endl;
|
|
return true;
|
|
}
|
|
|
|
std::string WardenModuleManager::getCachePath(const std::vector<uint8_t>& md5Hash) {
|
|
// Convert MD5 hash to hex string for filename
|
|
std::string hexHash;
|
|
hexHash.reserve(md5Hash.size() * 2);
|
|
|
|
for (uint8_t byte : md5Hash) {
|
|
char buf[3];
|
|
snprintf(buf, sizeof(buf), "%02x", byte);
|
|
hexHash += buf;
|
|
}
|
|
|
|
return cacheDirectory_ + "/" + hexHash + ".wdn";
|
|
}
|
|
|
|
} // namespace game
|
|
} // namespace wowee
|