Jump to content
  • SeedTheNet
  • SeedTheNet
    U.S. law enforcement arrested on Wednesday a New York man believed to be Pompompurin, the owner of the BreachForums hacking forum.
    According to court documents, he was charged with one count of conspiracy to solicit individuals to sell unauthorized access devices.
    During the arrest, the defendant allegedly admitted that his real name was Connor Brian Fitzpatrick and that he was Pompourin, the owner of the Breach Forums cybercrime forum.
    "When I arrested the defendant on March 15, 2023, he stated to me in substance and in part that: a) his name was Conor Brian FitzPatrick; b) he used the alias "pompourin," and c) he was the owner and administrator of "BreachForums," the data breach website referenced in the Complaint," FBI Special Agent John Longmire says.
    Fitzpatrick was released on Thursday on a $300,000 bond and will appear in the District Court of the Eastern District of Virginia on March 24, as first reported by Bloomberg.
    Until his appearance in court, the defendant has surrendered his documents and will only be allowed to travel within the Southern and Eastern Districts of New York and the Eastern District of Virginia for court purposes. He is also restricted from contacting witnesses, codefendants, or coconspirators.
     
    While the suspected owner of BreachForums is away, a forum admin said that the site would continue to operate in its current capacity.
    The admin added that they have full access to the site's infrastructure and will continue to operate the forum.
    Who is Pompompurin?
    Pompompurin has been a well-known player in a cybercriminal underground devoted to breaching companies and selling or leaking stolen data through forums and social media. He was also a high-profile member of the RaidForums cybercrime forum.
    After the FBI seized RaidForums in 2022, Pompourin created a new forum named 'BreachForums' to fill the void.
    It has since become the largest data leak forum of its kind, commonly used by hackers and ransomware gangs to leak stolen data.
    Last week, BreachForums was used by a threat actor to attempt to sell the personal data of U.S. politicians that was stolen in a breach on D.C. Health Link, a healthcare provider for U.S. House members, their staff, and their families.
    While BreachForums became a force in cybercrime on its own, Pompompurin has also been involved in various high-profile company breaches.
    These breaches include sending fake cyberattack emails using a flaw in the FBI's Law Enforcement Enterprise Portal (LEEP), stealing customer data from Robinhood, and allegedly using a bug to confirm the email addresses of 5.4 million Twitter users.
    Source:
    https://www.bleepingcomputer.com/news/security/alleged-breachforums-owner-pompompurin-arrested-on-cybercrime-charges/
    Update from BF :

     
     

    SeedTheNet
    FortiOS / FortiProxy - Heap buffer underflow in administrative interface
    Summary
    A buffer underwrite ('buffer underflow') vulnerability in FortiOS & FortiProxy administrative interface may allow a remote unauthenticated attacker to execute arbitrary code on the device and/or perform a DoS on the GUI, via specifically crafted requests.
     
    Exploitation status:
    Fortinet is not aware of any instance where this vulnerability was exploited in the wild. We continuously review and test the security of our products, and this vulnerability was internally discovered within that frame.
    Affected Products
    FortiOS version 7.2.0 through 7.2.3
    FortiOS version 7.0.0 through 7.0.9
    FortiOS version 6.4.0 through 6.4.11
    FortiOS version 6.2.0 through 6.2.12
    FortiOS 6.0 all versions
    FortiProxy version 7.2.0 through 7.2.2
    FortiProxy version 7.0.0 through 7.0.8
    FortiProxy version 2.0.0 through 2.0.12
    FortiProxy 1.2 all versions
    FortiProxy 1.1 all versions
    FortiOS-6K7K version 7.0.5
    FortiOS-6K7K version 6.4.10
    FortiOS-6K7K version 6.4.8
    FortiOS-6K7K version 6.4.6
    FortiOS-6K7K version 6.4.2
    FortiOS-6K7K version 6.2.9 through 6.2.12
    FortiOS-6K7K version 6.2.6 through 6.2.7
    FortiOS-6K7K version 6.2.4
    FortiOS-6K7K 6.0 all versions
     
    Even when running a vulnerable FortiOS version, the hardware devices listed below are *only* impacted by the DoS part of the issue, *not* by the arbitrary code execution (non-listed devices are vulnerable to both): 
     
    FortiGateRugged-100C
    FortiGate-100D
    FortiGate-200C
    FortiGate-200D
    FortiGate-300C
    FortiGate-3600A
    FortiGate-5001FA2
    FortiGate-5002FB2
    FortiGate-60D
    FortiGate-620B
    FortiGate-621B
    FortiGate-60D-POE
    FortiWiFi-60D
    FortiWiFi-60D-POE
    FortiGate-300C-Gen2
    FortiGate-300C-DC-Gen2
    FortiGate-300C-LENC-Gen2
    FortiWiFi-60D-3G4G-VZW
    FortiGate-60DH
    FortiWiFi-60DH
    FortiGateRugged-60D
    FortiGate-VM01-Hyper-V
    FortiGate-VM01-KVM
    FortiWiFi-60D-I
    FortiGate-60D-Gen2
    FortiWiFi-60D-J
    FortiGate-60D-3G4G-VZW
    FortiWifi-60D-Gen2
    FortiWifi-60D-Gen2-J
    FortiWiFi-60D-T
    FortiGateRugged-90D
    FortiWifi-60D-Gen2-U
    FortiGate-50E
    FortiWiFi-50E
    FortiGate-51E
    FortiWiFi-51E
    FortiWiFi-50E-2R
    FortiGate-52E
    FortiGate-40F
    FortiWiFi-40F
    FortiGate-40F-3G4G
    FortiWiFi-40F-3G4G
    FortiGate-40F-3G4G-NA
    FortiGate-40F-3G4G-EA
    FortiGate-40F-3G4G-JP
    FortiWiFi-40F-3G4G-NA
    FortiWiFi-40F-3G4G-EA
    FortiWiFi-40F-3G4G-JP
    Solutions
    Please upgrade to FortiOS version 7.4.0 or above
    Please upgrade to FortiOS version 7.2.4 or above
    Please upgrade to FortiOS version 7.0.10 or above
    Please upgrade to FortiOS version 6.4.12 or above
    Please upgrade to FortiOS version 6.2.13 or above
    Please upgrade to FortiProxy version 7.2.3 or above
    Please upgrade to FortiProxy version 7.0.9 or above
    Please upgrade to FortiOS-6K7K version 7.0.10 or above
    Please upgrade to FortiOS-6K7K version 6.4.12 or above
    Please upgrade to FortiOS-6K7K version 6.2.13 or above
     
    Workaround for FortiOS:
     
    Disable HTTP/HTTPS administrative interface
    OR
    Limit IP addresses that can reach the administrative interface:
     
    config firewall address
    edit "my_allowed_addresses"
    set subnet <MY IP> <MY SUBNET>
    end
     
    Then create an Address Group:
     
    config firewall addrgrp
    edit "MGMT_IPs"
    set member "my_allowed_addresses"
    end
     
    Create the Local in Policy to restrict access only to the predefined group on management interface (here: port1):
     
    config firewall local-in-policy
    edit 1
    set intf port1
    set srcaddr "MGMT_IPs"
    set dstaddr "all"
    set action accept
    set service HTTPS HTTP
    set schedule "always"
    set status enable
    next
    edit 2
    set intf "any"
    set srcaddr "all"
    set dstaddr "all"
    set action deny
    set service HTTPS HTTP
    set schedule "always"
    set status enable
    end
     
    If using non default ports, create appropriate service object for GUI administrative access:
     
    config firewall service custom
    edit GUI_HTTPS
    set tcp-portrange <admin-sport>
    next
    edit GUI_HTTP
    set tcp-portrange <admin-port>
    end
     
    Use these objects instead of "HTTPS HTTP "in the local-in policy 1 and 2 below.
     
    When using an HA reserved management interface, the local in policy needs to be configured slightly differently - please see: https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-a-local-in-policy-on-a-HA/ta-p/222005
     
    Please contact customer support for assistance.
    Acknowledgement
    Internally discovered and reported by Kai Ni from Burnaby InfoSec team.

    SeedTheNet
    FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface
    Summary
    An authentication bypass using an alternate path or channel vulnerability [CWE-288] in FortiOS, FortiProxy and FortiSwitchManager may allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
     
    Exploitation Status:
    Fortinet is aware of an instance where this vulnerability was exploited, and recommends immediately validating your systems against the following indicator of compromise in the device's logs:
    user="Local_Process_Access" 
    Please contact customer support for assistance.
     
    UPDATE: Fortinet is aware of instances where this vulnerability was exploited to download the config file from the targeted devices, and to add a malicious super_admin account called  "fortigate-tech-support":
    # show system admin
    edit "fortigate-tech-support"
    set accprofile "super_admin"
    set vdom "root"
    set password ENC [...]
    next
    Please contact customer support for assistance.
     
    Workaround:
    FortiOS:
    Disable HTTP/HTTPS administrative interface
    OR
    Limit IP addresses that can reach the administrative interface:
    config firewall address
    edit "my_allowed_addresses"
    set subnet <MY IP> <MY SUBNET>
    end
    Then create an Address Group:
    config firewall addrgrp
    edit "MGMT_IPs"
    set member "my_allowed_addresses"
    end
    Create the Local in Policy to restrict access only to the predefined group on management interface (here: port1):
    config firewall local-in-policy
    edit 1
    set intf port1
    set srcaddr "MGMT_IPs"
    set dstaddr "all"
    set action accept
    set service HTTPS HTTP
    set schedule "always"
    set status enable
    next
    edit 2
    set intf "any"
    set srcaddr "all"
    set dstaddr "all"
    set action deny
    set service HTTPS HTTP
    set schedule "always"
    set status enable
    end
    If using non default ports, create appropriate service object for GUI administrative access:
    config firewall service custom
    edit GUI_HTTPS
    set tcp-portrange <admin-sport>
    next
    edit GUI_HTTP
    set tcp-portrange <admin-port>
    end
    Use these objects instead of "HTTPS HTTP "in the local-in policy 1 and 2 below.
    UPDATE: When using an HA reserved management interface, the local in policy needs to be configured slightly differently - please see: https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-a-local-in-policy-on-a-HA/ta-p/222005
    Please contact customer support for assistance.
     
    FortiProxy:
    Disable HTTP/HTTPS administrative interface
    OR
    For FortiProxy VM all versions or FortiProxy appliance 7.0.6:
    Limit IP addresses that can reach the administrative interface (here: port1):
    config system interface
    edit port1
    set dedicated-to management
    set trust-ip-1 <MY IP> <MY SUBNET>
    end
    Please contact customer support for assistance.
     
    FortiSwitchManager:
    DIsable HTTP/HTTPS administrative interface
    Please contact customer support for assistance.
    Affected Products
    FortiOS versions 5.x, 6.x are NOT impacted.
    FortiOS version 7.2.0 through 7.2.1
    FortiOS version 7.0.0 through 7.0.6
    FortiProxy version 7.2.0
    FortiProxy version 7.0.0 through 7.0.6
    FortiSwitchManager version 7.2.0
    FortiSwitchManager version 7.0.0
    Solutions
    Please upgrade to FortiOS version 7.2.2 or above
    Please upgrade to FortiOS version 7.0.7 or above
    Please upgrade to FortiProxy version 7.2.1 or above
    Please upgrade to FortiProxy version 7.0.7 or above
    Please upgrade to FortiSwitchManager version 7.2.1 or above
    Please upgrade to FortiSwitchManager version 7.0.1 or above
    Please upgrade to FortiOS version 7.0.5 B8001 or above for FG6000F and 7000E/F series platforms

    SeedTheNet

    PS5 4.03 Kernel Exploit

    By SeedTheNet, in Gaming,

    PS5 4.03 Kernel Exploit
     
    Summary
    This repo contains an experimental WebKit ROP implementation of a PS5 kernel exploit based on TheFlow's IPV6 Use-After-Free (UAF), which was reported on HackerOne. The exploit strategy is for the most part based on TheFlow's BSD/PS4 PoC with some changes to accommodate the annoying PS5 memory layout (for more see Research Notes section). It establishes an arbitrary read / (semi-arbitrary) write primitive. This exploit and its capabilities have a lot of limitations, and as such, it's mostly intended for developers to play with to reverse engineer some parts of the system.
    Also note; stability is fairly low, especially compared to PS4 exploits. This is due to the bug's nature of being tied to a race condition as well as the mitigations and memory layout of the PS5. This document will contain research info about the PS5, and this exploit will undergo continued development and improvements as time goes on.
    This could possibly work on 4.50 as well via substituting valid 4.50 gadget offsets + kernel slides, but that will be for future work.
    Those interested in contributing to PS5 research/dev can join a discord I have setup here.
     
    Currently Included
    Obtains arbitrary read/write and can run a basic RPC server for reads/writes (or a dump server for large reads) (must edit your own address/port into the exploit file on lines 673-677) Enables debug settings menu (note: you will have to fully exit settings and go back in to see it). Gets root privileges  
    Limitations
    This exploit achieves read/write, but not code execution. This is because we cannot currently dump kernel code for gadgets, as kernel .text pages are marked as eXecute Only Memory (XOM). Attempting to read kernel .text pointers will panic! As per the above + the hypervisor (HV) enforcing kernel write protection, this exploit also cannot install any patches or hooks into kernel space, which means no homebrew-related code for the time being. Clang-based fine-grained Control Flow Integrity (CFI) is present and enforced. Supervisor Mode Access Prevention/Execution (SMAP/SMEP) cannot be disabled, due to the HV. The write primitive is somewhat constrained, as bytes 0x10-0x14 must be zero (or a valid network interface). The exploit's stability is currently poor. More on this below. On successful run, exit the browser with circle button, PS button panics for a currently unknown reason.  
    How to use
    Configure fakedns via dns.conf to point manuals.playstation.net to your PCs IP address Run fake dns: python fakedns.py -c dns.conf Run HTTPS server: python host.py Go into PS5 advanced network settings and set primary DNS to your PCs IP address and leave secondary at 0.0.0.0 Sometimes the manual still won't load and a restart is needed, unsure why it's really weird Go to user manual in settings and accept untrusted certificate prompt, run Optional: Run rpc/dump server scripts (note: address/port must be substituted in binary form into exploit.js).  
    Future work
    Fix-up sockets to exit browser cleanly (top prio) Write some data patches (second prio) Enable debug settings Patch creds for uid0 Jailbreak w/ cr_prison overwrite Improve UAF reliability Improve victim socket reliability (third prio) Use a better / more consistent leak target than kqueue  
    Using RPC and Dumping Kernel .data
    RPC
    RPC is a very simple and limited setup.
    Edit your IP+port (if changed) into exploit.js. Run the server via python rpcserver.py, allow the PS5 to connect when the exploit finishes. The PS5 will send the kernel .data base address in ASCII and you can then send read and write commands. Example is below. [RPC] Connection from: ('10.0.0.169', 59335) [RPC] Received kernel .data base: 0x0xffffffff88530000 > r 0xffff81ce0334f000 42 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 > w 0xffff81ce0334f004 0x1337 Wrote qword. This setup is somewhat jank and a better system will be in place soon.
    Dump
    Edit your IP+port (if changed) into exploit.js. Comment the RPC code in exploit.js and uncomment dumper code. Run the server via python dumpserver.py, allow the PS5 to connect and start dumping when exploit finishes. It will continue to dump data from the kernel base until it panics due to hitting unmapped memory. Note: read is somewhat slow at ~200kbps, so it may take 10 minutes or so to complete.  
    Exploit Stages
    This exploit works in 5 stages, and for the most part follows the same exploit strategy as theflow's poc.
    Trigger the initial UAF on ip6_pktopts and get two sockets to point to the same pktopts / overlap (master socket <-> overlap spray socket) Free the pktopts on the master socket and fake it with an ip6_rthdr spray containing a tagged tclass overlap. Infoleak step. Use pktopts/rthdr overlap to leak a kqueue from the 0x200 slab and pktopts from the 0x100 slab. Arbitrary read/write step. Fake pktopts again and find the overlap socket to use IPV6_RTHDR as a read/write primitive. Cleanup + patch step. Increase refcount on corrupted sockets for successful browser exit + patch data to enable debug menu and patch ucreds for uid0.  
    Stability Notes
    Stability for this exploit is at about 30%, and has multiple potential points of failure. In order of observed descending liklihood:
    Stage 1 causes more than one UAF due to failing to catch one or more in the reclaim, causing latent corruption that causes a panic some time later on. Stage 4 finds the overlap/victim socket, but the pktopts is the same as the master socket's, causing the "read" primitive to just read back the pointer you attempt to read instead of that pointer's contents. This needs some improvement and to be fixed if possible because it's really annoying. Stage 1's attempt to reclaim the UAF fails and something else steals the pointer, causing immediate panic. The kqueue leak fails and it fails to find a recognized kernel .data pointer. Leaving the browser through "unusual" means such as PS button, share button, or browser crash, will panic the kernel. Needs to be investigated.  
    Research Notes
    It appears based on various testing and dumping with the read primitive, that the PS5 has reverted back to 0x1000 page size compared to the PS4's 0x4000. It also seems on PS5 that adjacent pages rarely belong to the same slab, as you'll get vastly different data in adjacent pages. Memory layout seems more scattered. Often when the PS5 panics (at least in webkit context), there will be awful audio output as the audio buffer gets corrupted in some way. Sometimes this audio corruption persists to the next boot, unsure why. Similar to PS4, the PS5 will require the power button to be manually pressed on the console twice to restart after a panic. It is normal for the PS5 to take an absurd amount of time to reboot from a panic if it's isolated from the internet (unfortunately). Expect boot to take 3-4 minutes.  
    Contributors / Special Thanks
    Andy Nguyen / theflow0 - Vulnerability and exploit strategy ChendoChap - Various help with testing and research Znullptr - Research/RE sleirsgoevy - Research/RE + exploit strat ideas bigboss - Research/RE flatz - Research/RE + help w/ patches zecoxao - Research/RE SocracticBliss - Research/RE laureeeeeee - Background low-level systems knowledge and assistance About
    An experimental webkit-based kernel exploit (Arb. R/W) for the PS5 on 4.03FW
    Resources
      Readme Stars
      397 stars Watchers
      14 watching Forks
      18 forks Releases
    No releases published Packages
    No packages published Contributors 2
    Cryptogenic Specter pquerner Pascal Querner Languages
        JavaScript 73.4%   Python 24.9%   HTML 1.7%
     
    https://github.com/Cryptogenic/PS5-4.03-Kernel-Exploit

    SeedTheNet
    Hello everyone,

    By now we reach the time when our good old original disks reach their date of expiry and are expected to show serious physical failure. We decided to provide you an alternative way to continue playing!

    Below you'll find a step-by-step installation guide for each game.

    Big thanks to GameReplays for hosting the downloads!
     
    Battle for Middle-earth


    If you have the original BfME disk then please skip to step 3 and use your legitimate cd key.
    Download The Battle for Middle-earth ™. The original unmodified version. Main / Mirror 1 Open tBfMe.iso. This will mount the BfME disk to a virtual drive. Launch AutoRun.exe on the disk. Install the game. Need a cd key? (Note: some antivirus programs will flag the keygen. This is a false positive. The keygen is safe.) Install patches: Easiest way is to download our all-in-one patch 1.06 installer. (Installs 1.03, 1.05 and 1.06 and T3A:Online in your language.)
    http://server.cnc-on...tch1.06_AIO.exe
    All-in-one patch installer includes no-cd fix, widescreen fix and T3A:Online, please select these components. (If you didn't install it in step 4) Download T3A:Online to play online! Download the Battle for Middle-earth: HD Edition. You can play online with people who don't have it. Download page https://www.moddb.co...-hd-edition-v10 To setup your screen resolution click Start and type:

    %appdata%

    This will open the folder location C:\Users\username\AppData\Roaming in the Windows Explorer app. Search for the ...\AppData\Roaming\My Battle for Middle-earth Files folder there (or create a new folder). Download Options.ini and put it in the folder. [image] Open the Options.ini file and edit Resolution = 1920 1080 to your screen resolution and save.  
     
    Battle for Middle-earth II


    If you have the original BfME 2 disk then please skip to step 3 and use your legitimate cd key.
    Download The Battle for Middle-earth ™ II. The original unmodified version. Main / Mirror 1 Open tBfMe_II.iso. This will mount the BfME 2 disk to a virtual drive. Launch AutoRun.exe on the disk. [image] Install the game. Need a cd key? (Note: some antivirus programs will flag the keygen. This is a false positive. The keygen is safe.) Install patches.

    • Download the Battle for Middle-earth II v1.06 Patch in your language. (Scroll down)
    https://www.gamefron...tegory/91-v1-06

    • Download the Battle for Middle-earth II Patch 1.09
    https://www.gamerepl...fme2-patch-1.09
    Patch 1.09 includes widescreen fix.

    • To play BfME 2 without a disk use this game.dat file. Move it to the game's installation folder at C:\Program Files (x86)\Electronic Arts\The Battle for Middle-earth(tm) II Download T3A:Online to play online! Download the Battle for Middle-earth II: HD Edition. You can play online with people who don't have it. Download page https://www.moddb.co...hd-edition-v-11 To setup your screen resolution click Start and type:

    %appdata%

    This will open the folder location C:\Users\username\AppData\Roaming in the Windows Explorer app. Search for the ...\AppData\Roaming\My Battle for Middle-earth(tm) II Files folder there (or create a new folder). Download Options.ini and put it in the folder. [image] Open the Options.ini file and edit Resolution = 1920 1080 to your screen resolution and save.  
     
    The Rise of the Witch King


    If you have the original RotWK disk then please skip to step 3 and use your legitimate cd key.

    RotWK needs BfME 2 version 1.06 installed. Use the BfME 2 Patch 1.09 Switcher to change to version 1.06.
    Download The Rise of the Witch King. The original unmodified version. Main / Mirror 1 Open rotwk.iso. This will mount the RotWK disk to a virtual drive. Launch AutoRun.exe on the disk. [image] Install the game. Need a cd key? (Note: some antivirus programs will flag the keygen. This is a false positive. The keygen is safe.) Install patches.

    • 1. Download the Rise of the Witch-king v2.01 Patch in your language.
    https://www.gamefron...ory/patches-148

    • 2. Download the Rise of the Witch King Patch 2.02 v8.0.0
    https://www.gamerepl...2-download-page

    • 3. Download the Rise of the Witch King Patch 2.02 v8.4.0
    https://www.gamerepl...tch-840-release
    Patch 2.02 includes no-cd fix and widescreen fix.
      Download T3A:Online to play online! Rise of the Witch King: HD Edition is not available yet. Follow development here https://www.moddb.co...otwk-hd-edition
    Try the Age of the Ring RotWK 2.02 mod from the HD Edition team. To setup your screen resolution click Start and type:

    %appdata%

    This will open the folder location C:\Users\username\AppData\Roaming in the Windows Explorer app. Search for the ...\AppData\Roaming\My The Lord of the Rings, The Rise of the Witch-king Files folder there (or create a new folder). Download Options.ini and put it in the folder. [image] Open the Options.ini file and edit Resolution = 1920 1080 to your screen resolution and save.  
     
    T3A:Online
    T3A:Online integrates seamlessly into your BfME experience and allows you to play online. It returns the online component of all three games that uses p2p connections, allowing for stabler games and reduced lag. The HD Editions and mods can be enjoyed without hassle.
    Register your Revora Account. If you already have an account on Revora Forums then log in. Create your Server Login. Warning: Your T3A:Online server login is saved in plain text. Do not re-use the password for your e-mail account, social media, ect. Get the latest patch. See the above guide for your game. Download the T3A:Online Launcher. Once installed, open the launcher and hook your game to launch it from any shortcut. [image] Looking for games? Ask on the T3A:Online Community Discord. discord.gg/aMnQMDD
     
     
    Troubleshooting
    Exception Access Violation error when starting game + Options.ini
    This is an issue for Windows Vista, Windows 7, Windows 8.1 and Windows 10: if you game does not start...
    These are the same instructions as above for changing screen resolution.
    Click Start and type:
    %appdata%
    This will open the folder location C:\Users\username\AppData\Roaming in the Windows Explorer app. Search for your game's folder: My Battle for Middle-earth Files My Battle for Middle-earth(tm) II Files My The Lord of the Rings, The Rise of the Witch-king Files Or create a new folder with that name. Please note that if you have installed BfME in another language then the folder name might be different. Download Options.ini and put it in the folder. [For BfME 1] [For BfME 2] [For RotWK] If the folder Maps is not there then make a new folder and name it Maps. Changing the screen resolution
    The game's resolution can be edited to match your screen in the options.ini file.

    Game crashes before opening with no error.
    First, upgrade your graphics card drivers.

    If you have more than one graphics card in your computer then test running the game on each card.

    For computers with NVIDIA and Intel: The game will not open on an Intel Integrated graphics card, so use the NVIDIA graphics card. First, right click the game's shortcut. Then in the menu click Run with graphics processor and select High-performance NIVIDIA processor. Also, you can open the NVIDIA settings from this menu and choose programs to use with the graphics card.

    While online the game says to update.
    Check these for BfME 2
    Make sure you have installed v1.06 before v1.09 Check these for RotWK
    Make sure you have installed v2.01 before v2.02 Both games
    Make sure you've got the original, unedited game. Downloads and guide are above. Make sure you are starting the game through the T3A:Online launcher OR have it hooked (from the Hook menu in the launcher) when you open your game's shortcut Make sure you are running everything related the game and T3A:Online as administrator. The launcher, the game shortcut, the game's exe files in the installation folder. In your Options.ini, make sure the following line is present:

    HasGotOnline = yes If the above solutions don't work for you then please reinstall the game and follow the installation guide carefully.
      Cannot locate the DVD-ROM
    Update to the latest version of the game. Check the installation guide above. If you are using an earlier version of the game then check the below guides for Virutal Disk Drive and Mini-images. Turn off "run as administrator" for the game.  
    Virtual Disk Drive
    Windows 10 can mount disks to a virtual drive. If you have Windows XP, Windows Vista, Windows 7 or Windows 8.1 then you will need a virtual drive program like WinCDEmu or Alcohol 52% to mount downloaded disks.

    We do not recommend Daemon Tools Lite. https://filehippo.co...on_tools/14073/ If you use Daemon Tools Lite do not update this specific version if the old version runs on your computer.

    Mini-images
    Mini-images are used for BfME 2 v1.06 and RotWK 2.01. If you wish to play these version you will need to mount a mini-image to a virtual disk drive. Firstly, you will need a program to mount a virutal disk (WindCDEmu or Alcohol 52%). After installing please restart your computer. Next you will need one of these mini-images.
    To play BfME 2 without a disk use this mini-image. To play RotWK without a disk use this mini-image. Alternatively, you can use an alternative game.dat file for BfME 2 which may restrict online play.
    To play BfME 2 without a disk use this game.dat file. Place it in the game's installation folder at C:\Program Files (x86)\Electronic Arts\The Battle for Middle-earth (tm) II The BfME 2 patch 1.09 team recommend playing BfME 2 v1.00 with the mini-image and BfME 2 v1.06 and v1.09 with the modified game.dat file. The modified game.dat file is incompatible with BfME 2 v1.00.
      Auto-defeat: You are defeated 3 minutes into the game.
    This is part of the game's anti-piracy. To fix it:

    For BfME 1
    Open the game folder location. On Windows 10 the location is at: C:\Program Files (x86)\EA Games\The Battle for Middle-earth (tm) Delete this file from the game folder:
    LOTRBFMe.dat [image of file] Run the lotrbfme_inst.exe file. If you don't have that file in your game folder then download and move the following exe file to your game folder. Run the exe file in the game folder. You can download a zip folder with the exe here: lotrbfme_inst.exe For BfME 2 (experimental fix)
    Open the game folder location. On Windows 10 the location is at: C:\Program Files (x86)\Electronic Arts\The Battle for Middle-earth (tm) II Delete this file from the game folder:
    lotrbfme2.exe [image] Then find this file:
    game.dat [image]

    Rename the file to:
    lotrbfme2.exe [image] For RotWK
    Open the game folder location. On Windows 10 the location is at: C:\Program Files (x86)\Electronic Arts\The Lord of the Rings, The Rise of the Witch-king Delete this file from the game folder:
    lotrbfme2ep1.exe Find this file
    game.dat

    Rename the file to
    lotrbfme2ep1.exe  
    Game Crash (Code Error)
    Coming soon.
     
    Compatibility
    If you have mods that install into the game's installation folder please uninstall them and remove leftover files before reinstalling the game.

    Not applicable to new installations: the Maps folder in My Battle for Middle-earth Files can become crowded if you've downloaded a lot of maps. This might cause a Microsoft Visual C++ Runtime Library error.

    More Help
    Check our Forums for solved issues.

    Join games on our Discord.
     
    ORIGINAL POST : https://forums.revora.net/topic/105190-bfme1bfme2rotwk-games-download-installation-guide/

    SeedTheNet
    COMMANDOS 2: DESTINATION PARIS MOD

    What Is Commandos 2: Destination Paris?
    Commandos 2: Destination Paris, is a modification (mod) of the game Commandos 2: Men Of Courage, originally made by Pyro Studios. Most of the original game has been changed, to give the player a new and exciting Commandos experience. Pyro Studios are no longer making Commandos games in the style of Commandos 2 (or so it seems)), which many people (including myself) are fans of. This mod gives people almost a new game, without having to spend a penny.
    The mod has been made more challenging, to stop you completing it too quickly, so you will get a long game. It will test even the best Commandos players. Nevertheless it's been calibrated for novices and for people that are a bit "rusty".

    Who Made The Mod? Many devoted fans gave their support.

    Destination Paris is reborn!
    Since the late news seem to have excluded an immediate possibility of a new commandos game in the GOS
    (good old style [of Commandos 2, for ex.]) I have decided to remod Commandos 2: Destination Paris and give it new life, including some great new missions from other willing modders and the possibility to play the Commandos BTCOD Missions on Commandos 2!!

    The mod has been revisited under many aspects, it has been rewritten in many parts, below you will find the descriptions.
    For a good overview and a description of the new features, read the guides under the C2: Destination Paris section on our site.
    Special thanks go to all the people that kept trying and going through the many limiting barriers they encountered.
    Extra special thanks to our Chinese Community!


    Features
    Commandos 2: Destination Paris contains all the main and bonus missions (ALL modified) from Men Of Courage plus a lot of Fan made missions and ALL the missions from BEL/BTCOD/C3 (plus a few more bonuses 😉
    Here is a list of all the mods features:
    118 Missions! 9 completely new missions in new maps ALL the 9 missions from BTCOD (including the tutorial mission) ALL the 20 missions from BEL ALL the Commandos 3 missions New abilities for the Commandos Alot more enemies than before, now you will truly feel behind enemy lines New enemies, including 7 Secret Agents Patrols will not touch you unless you act suspiciously Be careful of the new "special enemies", they are deadly at any distance The existing enemies, including the new ones, have been made alot more dangerous than in the past As a counter-force, now your commandos have a bigger potential in fighting the terrible Nazis Commandos will appear in missions in which they weren't before The starting equipment of each Commando has changed The items have been rebalanced throughout the missions No more exceeding equipment, you will have to sweat for a grenade Added an RPG style gameplay where you can power up your Commandos by finding better weapons and uniforms The weapons characteristics have been altered (the Rifle has two ammo but the loaded one cannot be taken out) New patrols have been added New objectives Lupin's stalking ability has been made useful to get around enemies unseen The scenarios will include an infinite quantity of variations and surprises, do not fall unprepared Each place, if visited, will have a reward; no more empty areas without a heck of a reason to visit New sounds, some taken from the old but never passed Commandos BEL and BTCOD, others new and waiting to be heard New music, be rrrready Some snipers now will leave their position to investigate (not all), you'd better watch out and...take it to your advantage Ammo has been rebalanced, no more easy filling weapons ready to kill Gas grenades have a consolidated effectiveness of 60 seconds If you beat up an enemy he will lose consciousness for 1 minute Spy's first venom dosis will be effective for 30 seconds now! Your life will decrease upon increasing the difficulty New background music in main menu, credits New uniforms for the Commandos Vehicles have been rebalanced (now they will be really useful) Missions have been populated with more people, each doing his work, giving them a look of realism Levels design has been changed, doors that were easy before, now require your complete attention Windows aren't secure anymore, when you least expect it, an enemy could watch through a window and... Levels interactibility has increased, your Sniper can climb on some trees now, and your men can hide in new unsuspectable places The Atmospherical agents (rain, snow) have been reproduced in more missions The mod's difficulty has been re-calibrated, as much as for Pro's like for Newcomers, everyone will have fun 28 new fan made missions ALL the 9 missions from BTCOD (including the tutorial mission)) 1 completely new mission Note: At easiest difficulty level, you can cure fallen Commandos by medicating them or by making them eat some food (or medicate themselves by pressing the "use button" in the inventory on a medikit)  
    Original post : https://commandoshq.net/c2dp_info.php
    Download Links:

    SeedTheNet
    First we have to open up the Windows Defender Firewall panel from the control panel , or by directly typing Windows Defender Firewall with Advanced Security in Windows Start.

    Advanced Settings You need to look for Remote Desktop - User Mode (TCP-IN) and (UDP-IN)
        3. Double click , Click "Scope" , after that Remote Addresses

    Add your specific IP Addresses that should be allowed to connect to RDP , so you can be at safe that no is trying to brute force your accounts , Apply and OK, and that way your RDP connection is now only allowed through these IP Addresses that you have added
    If the RDP is local , local addresses can be added also.

     
    For more assistance and help check the forum topic here : https://www.seedthe.net/topic/22-firewall-rdp-connection-through-windows-firewall/?tab=comments#comment-22
     

    SeedTheNet
    Since the IP is owned by Konami and Kojima has already left Konami , I doubt so they can make a remaster or remake for newer console versions / PC , unless they hire Kojima again or bring another one to do the port , but I doubt so
    First of all we start with Firmware 4.88 - https://www.playstation.com/en-us/support/hardware/ps3/system-software/ so the patches for the game can work.
    There is a custom built RPCS3 that reportedly can run MGS4 good - https://dev.azure.com/illusion9804/rpcs3/_build?definitionId=3&_a=summary
    Illusion9804 RPCS3 is reportedly to be able to run MGS4 without getting freezes/crashes that you would get from official build
    It took me a while to understand how could I just download from Azure, but it could be done in those steps :
    Downloading Illusion9804's RPCS3
    1)Click the link provided up for dev.azure
    2)You will reach this page

    3)Click one of the successful logs , for example the second one
    4)Scroll down and then click Windows build

    5)Then you would receive something like this :

    6)Clicking on 1 artifact will prompt you to download RPCS3
    Installation:
    1)To install game data properly you would need an older version of RPCS3 for example version 0.14 and you should get a result size of 8.37GB
    2)Move data files to the newer RPCS3 that you have obtained from Azure , it can be found in dev_hdd0 folder
    3)Adjust the config as below, different hardware might need different adjustments , but it should work as described in this post https://forums.rpcs3.net/thread-158603-page-11.html
     
      https://forums.rpcs3.net/thread-158603-page-11.html
    In this post by quick.sliver1 ,  there are explanations more about what works and doesn't work.
     
    Game patch link is here - https://a0.ww.np.dl.playstation.net/tpl/np/BLUS30109/BLUS30109-ver.xml
    To find patches for another game , you just have to change the game code in the link "BLUS30109" and replace it with the other game code.
    The wiki page of MGS4 in RPCS3 have special notes for the game also :
    https://wiki.rpcs3.net/index.php?title=Metal_Gear_Solid_4:_Guns_of_the_Patriots
    Special Notes
    Although you can use the latest RPCS3 master build to play MGS4 these days, for a lot of people, Illusion's custom build for MGS4 tend to net better results. If you would like to try it, grab it from here.
    To download: Click on the latest entry on the page > Click on 3 Published > Hover your mouse over the 3 dotted vertical menu button > click Download artifacts (Screenshot for reference)
    To use the build: Simply install it in a new/separate folder, DO NOT merge it with your current RPCS3 folder. In RPCS3 config, set “Accurate PPU 128 Reservations” to “14” in “debug tab” (may help with performance). Rest is default settings. It is also recommended that you update the game to 2.0 for the best results.
    Should you still want to use the latest master, use the canary patch below to stop the game from crashing. This patch is a game specific hack so it won't be merged into the patch manager. You will require firmware 4.87/4.88 to be installed, and then copy/paste the patch into a new txt file. Rename it "imported_patch.yml" and place it in the patches folder within your RPCS3 directory.
    Canary Patches
    PRX-rbYkgZMgx8Prd7WUAA39oYAdWcNo-0: "cellSpurs urgent commands hack - 4.87": Games: "Metal Gear Solid 4: Guns of the Patriots": BLES00246: [ All ] BLUS30109: [ All ] BLJM67001: [ All ] NPUB31633: [ All ] NPEB02182: [ All ] Author: elad335 Notes: "Workaround for freezes in Metal Gear Solid 4.\nThis patch applies to a firmware file for all games!\nUsage outside of Metal Gear Solid 4 is for debug purposes only.\nYou must have firmware version of exactly 4.87 in order to use it.\n\nKnown to affect:\nMetal Gear Solid 4" Patch Version: 1.0 Patch: - [ be32, 0x182B8, 0x38000002 ] PRX-oM7itnHHZPcaVx6KRGhZcv0o4gJj-0: "cellSpurs urgent commands hack - 4.88": Games: "Metal Gear Solid 4: Guns of the Patriots": BLES00246: [ All ] BLUS30109: [ All ] BLJM67001: [ All ] NPUB31633: [ All ] NPEB02182: [ All ] Author: elad335 Notes: "Workaround for freezes in Metal Gear Solid 4.\nThis patch applies to a firmware file for all games!\nUsage outside of Metal Gear Solid 4 is for debug purposes only.\nYou must have firmware version of exactly 4.88 in order to use it.\n\nKnown to affect:\nMetal Gear Solid 4" Patch Version: 1.0 Patch: - [ be32, 0x182B8, 0x38000002 ] Patches
    PPU-9712144d93487f0b62e39f55e175af783b58af72: "Disable shadows": Games: "Metal Gear Solid 4: Guns of the Patriots": BLES00246: [ 01.00 ] BLUS30109: [ 01.00 ] BLJM67001: [ 01.00 ] NPUB31633: [ 01.00 ] NPEB02182: [ 01.00 ] Author: TriggerHappy Notes: "Disabling shadows can give a significant performance boost." Patch Version: 1.0 Patch: - [ be32, 0x1358B8, 0x4E800020 ] PPU-33e09a0bd8fa2a3b28780a3feeb7b0e018bae381: "Disable shadows": Games: "Metal Gear Solid 4: Guns of the Patriots": BLES00246: [ 02.00 ] BLUS30109: [ 02.00 ] BLJM67001: [ 02.00 ] NPUB31633: [ 02.00 ] NPEB02182: [ 02.00 ] Author: TriggerHappy Notes: "Disabling shadows can give a significant performance boost." Patch Version: 1.0 Patch: - [ be32, 0x132354, 0x4E800020 ] With those current options described in this post, the game should be running fine , with some crashes here and there every a bit of time , memory access violation , for now I haven't found a fix for that , but the game runs fine , I have to save frequently so if it crashed I would have a save game.
     
     
    * To be edited / NOT COMPLETE

  • Member Statistics

    39
    Total Members
    53
    Most Online
    fluoxetine cost
    Newest Member
    fluoxetine cost
    Joined


×
×
  • Create New...

Important Information

Privacy Policy