2020-11-02 06:08:10 +01:00
|
|
|
#include "pch.h"
|
|
|
|
#include "Utils.h"
|
|
|
|
#include "Hooks.h"
|
|
|
|
|
2020-11-16 04:56:22 +01:00
|
|
|
typedef int (__cdecl* keyToLE_v25)(unsigned int* dest, int* key, int bits);
|
|
|
|
keyToLE_v25 keyToLE_v25_hook = nullptr;
|
2020-11-02 06:08:10 +01:00
|
|
|
|
2020-11-16 04:56:22 +01:00
|
|
|
typedef int (__cdecl* keyToLE_v28)(unsigned int* dest, int* key, int bits, bool isEncoded);
|
|
|
|
keyToLE_v28 keyToLE_v28_hook = nullptr;
|
|
|
|
|
|
|
|
typedef int (__thiscall* authTokenHook_v45)(void* This, char* authToken, int a3, int a4, int a5, size_t tokenLength,
|
|
|
|
int a7, int a8, int a9, __int64 bearerStr, int a11, int a12, int a13, int a14, char a15, int a16, int int_40,
|
|
|
|
int a18, char a19, int a20);
|
|
|
|
authTokenHook_v45 authToken_v45_hook = nullptr;
|
|
|
|
|
|
|
|
typedef char* (__cdecl* getFileId_v45)(char* dest, char* src, size_t srcLength);
|
|
|
|
getFileId_v45 getFileId_v45_hook = nullptr;
|
2020-11-02 06:08:10 +01:00
|
|
|
|
|
|
|
std::string prevKeyStr = std::string();
|
|
|
|
|
|
|
|
int __cdecl keyToLE_hook_v25(unsigned int* dest, int* key, int bits)
|
|
|
|
{
|
|
|
|
if (bits == 128)
|
|
|
|
{
|
|
|
|
BYTE keyBuffer[16];
|
|
|
|
BYTE* keyBufPtr = keyBuffer;
|
|
|
|
memcpy(keyBufPtr, key, 16);
|
|
|
|
|
|
|
|
// Only print out key if it is different
|
|
|
|
std::string newKeyStr = Utils::HexString(keyBufPtr, 16);
|
|
|
|
if (newKeyStr.compare(prevKeyStr) != 0)
|
|
|
|
std::cout << "Key: " << newKeyStr << std::endl << std::endl;
|
|
|
|
|
|
|
|
prevKeyStr = newKeyStr;
|
|
|
|
}
|
|
|
|
|
2020-11-16 04:56:22 +01:00
|
|
|
return keyToLE_v25_hook(dest, key, bits);
|
2020-11-02 06:08:10 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 09:35:26 +01:00
|
|
|
int __cdecl keyToLE_hook_v28(unsigned int* dest, int* key, int bits, bool isEncoded)
|
2020-11-02 06:08:10 +01:00
|
|
|
{
|
|
|
|
if (bits == 128)
|
|
|
|
{
|
|
|
|
void* decodedKeyPtr = key;
|
|
|
|
|
|
|
|
if (isEncoded)
|
|
|
|
{
|
|
|
|
// key is encoded with some sort of algorithm; decode it here
|
|
|
|
|
|
|
|
unsigned int keyDecoded[4];
|
|
|
|
unsigned int uVar1;
|
|
|
|
unsigned int keyPtr;
|
|
|
|
unsigned int uVar3;
|
|
|
|
int index;
|
|
|
|
|
|
|
|
keyPtr = *key;
|
|
|
|
index = 15;
|
|
|
|
uVar3 = key[1];
|
|
|
|
keyDecoded[0] = key[2];
|
|
|
|
keyDecoded[1] = key[3];
|
|
|
|
keyDecoded[2] = key[4];
|
|
|
|
keyDecoded[3] = key[5];
|
|
|
|
|
|
|
|
do
|
|
|
|
{
|
|
|
|
uVar1 = keyDecoded[index - 1 & 3];
|
|
|
|
keyDecoded[index & 3] =
|
|
|
|
keyDecoded[index & 3] +
|
|
|
|
(((((uVar1 + index + keyPtr & uVar1 * 16 + uVar3) * 2 + uVar1 * -17) -
|
|
|
|
index) - uVar3) - keyPtr);
|
2020-11-16 04:56:22 +01:00
|
|
|
|
|
|
|
index--;
|
2020-11-02 06:08:10 +01:00
|
|
|
}
|
|
|
|
while (index >= 0);
|
|
|
|
|
|
|
|
decodedKeyPtr = &keyDecoded;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy key bytes to new buffer
|
|
|
|
unsigned char keyBuffer[16];
|
|
|
|
unsigned char* keyBufPtr = keyBuffer;
|
|
|
|
memcpy(keyBufPtr, decodedKeyPtr, 16);
|
|
|
|
|
|
|
|
// Only print out key if it is different
|
|
|
|
std::string newKeyStr = Utils::HexString(keyBufPtr, 16);
|
|
|
|
if (newKeyStr.compare(prevKeyStr) != 0)
|
|
|
|
std::cout << "Key: " << newKeyStr << std::endl << std::endl;
|
|
|
|
|
|
|
|
prevKeyStr = newKeyStr;
|
|
|
|
}
|
|
|
|
|
2020-11-16 04:56:22 +01:00
|
|
|
return keyToLE_v28_hook(dest, key, bits, isEncoded);
|
|
|
|
}
|
|
|
|
|
|
|
|
int __fastcall authTokenHook_hook_v45(void* This, void* _EDX, char* authToken, int a3, int a4, int a5,
|
|
|
|
size_t tokenLength, int a7, int a8, int a9, __int64 bearerStr, int a11, int a12, int a13, int a14, char a15,
|
|
|
|
int a16, int int_40, int a18, char a19, int a20)
|
|
|
|
{
|
|
|
|
if (tokenLength == 311)
|
|
|
|
{
|
|
|
|
std::cout << "Auth token: " << authToken << std::endl << std::endl;
|
|
|
|
}
|
|
|
|
|
|
|
|
return authToken_v45_hook(This, authToken, a3, a4, a5, tokenLength, a7, a8, a9, bearerStr, a11, a12, a13, a14, 15,
|
|
|
|
a16, int_40, a18, a19, a20);
|
2020-11-02 06:08:10 +01:00
|
|
|
}
|
|
|
|
|
2020-11-16 04:56:22 +01:00
|
|
|
char* __cdecl hexToStr_hook_v45(char* dest, char* src, size_t srcLength)
|
|
|
|
{
|
|
|
|
if (srcLength == 20)
|
|
|
|
{
|
|
|
|
// Assume it is file id
|
|
|
|
}
|
|
|
|
|
|
|
|
return getFileId_v45_hook(dest, src, srcLength);
|
|
|
|
}
|
|
|
|
|
|
|
|
char* GetKeyFuncAddrV26()
|
2020-11-02 06:08:10 +01:00
|
|
|
{
|
|
|
|
BYTE ref_v19 = 0x55;
|
|
|
|
BYTE* byteAtAddrStr = (BYTE*)0x010800C0;
|
|
|
|
|
|
|
|
// Byte at byteAtAddr in 1.1.26-19 is 0x55
|
|
|
|
if (*byteAtAddrStr == ref_v19)
|
|
|
|
return (char*)0x010800C0;
|
|
|
|
else
|
|
|
|
return (char*)0x0107FEC0;
|
|
|
|
}
|
|
|
|
|
2020-11-16 04:56:22 +01:00
|
|
|
char* GetKeyFuncAddrV27()
|
2020-11-02 06:08:10 +01:00
|
|
|
{
|
|
|
|
BYTE ref_v7 = 0x55;
|
|
|
|
BYTE* byteAtAddrStr = (BYTE*)0x01068F90;
|
|
|
|
|
2020-11-03 09:35:26 +01:00
|
|
|
// Byte at byteAtAddr in 1.1.27-7 is 0x55
|
2020-11-02 06:08:10 +01:00
|
|
|
if (*byteAtAddrStr == ref_v7)
|
|
|
|
return (char*)0x01068F90;
|
|
|
|
else
|
|
|
|
return (char*)0x01068F20;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Hooks::Init()
|
|
|
|
{
|
|
|
|
int spotifyVer = Utils::GetSpotifyVersion();
|
|
|
|
|
|
|
|
// Method is stripped from Release build if this isn't here :/
|
|
|
|
std::cout << "Spotify version: " << Utils::GetSpotifyVersion() << std::endl;
|
|
|
|
|
|
|
|
switch (spotifyVer)
|
|
|
|
{
|
|
|
|
case 25:
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v25_hook = (keyToLE_v25)Utils::TrampHook32((char*)0x0106B920, (char*)keyToLE_hook_v25, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
|
|
|
case 26:
|
|
|
|
// Two 1.1.26 versions
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v25_hook = (keyToLE_v25)Utils::TrampHook32(GetKeyFuncAddrV26(), (char*)keyToLE_hook_v25, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
|
|
|
case 27:
|
|
|
|
// Two 1.1.27 versions
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v25_hook = (keyToLE_v25)Utils::TrampHook32(GetKeyFuncAddrV27(), (char*)keyToLE_hook_v25, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
2020-11-03 09:35:26 +01:00
|
|
|
case 28:
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v28_hook = (keyToLE_v28)Utils::TrampHook32((char*)0x01074650, (char*)keyToLE_hook_v28, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
|
|
|
case 29:
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v28_hook = (keyToLE_v28)Utils::TrampHook32((char*)0x010861B0, (char*)keyToLE_hook_v28, 6);
|
2020-11-03 09:35:26 +01:00
|
|
|
break;
|
2020-11-02 06:08:10 +01:00
|
|
|
case 30:
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v28_hook = (keyToLE_v28)Utils::TrampHook32((char*)0x0108E840, (char*)keyToLE_hook_v28, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
|
|
|
case 44:
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v28_hook = (keyToLE_v28)Utils::TrampHook32((char*)0x010CABC0, (char*)keyToLE_hook_v28, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
|
|
|
case 45:
|
2020-11-16 04:56:22 +01:00
|
|
|
keyToLE_v28_hook = (keyToLE_v28)Utils::TrampHook32((char*)0x010CF780, (char*)keyToLE_hook_v28, 6);
|
|
|
|
//authToken_v45_hook = (authTokenHook_v45)Utils::TrampHook32((char*)0x00EBA4F0, (char*)authTokenHook_hook_v45, 5);
|
|
|
|
//authToken_v45_hook = (authTokenHook_v45)Utils::TrampHook32((char*)0x00EBA4F0, (char*)authTokenHook_hook_v45, 5);
|
|
|
|
break;
|
|
|
|
case 46:
|
|
|
|
keyToLE_v28_hook = (keyToLE_v28)Utils::TrampHook32((char*)0x010C2FB0, (char*)keyToLE_hook_v28, 6);
|
2020-11-02 06:08:10 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|