![]() ![]() Then, by just using a wireshark, they could capture and parse the packets sent out by an actual player, and mimic those by sending identical packets with slightly altered information (hence the "bots"), and then just make a small script to swarm the server with basic calls. Making a call to get the entire server manifest was possible with a call (a REST call, I believe, though not 100% sure) that could have been mimicked with a program like Fiddler if they just grabbed the authentication token from an actual call. While corporate espionage (or someone within Respawn themselves) would make sense, the structure of the Stryder matchmaking backend was vulnerable.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |