I'm actually mildly surprised that the SC community doesn't have a tool for doing this kind of scanning running on at least one PC. However, old games are not using that system (or even the system that existed before that, lol). Of course, this doesn't work anymore because of NGDP, Blizzard's new download protocol, which ensures that all URLs like this are hashed and basically unguessable. Have the program send you an email when it gets something that isn't a 404/500. ![]() with an optional a-z in this case) and spam eternally. You take a known real patch URL, say, the download link for 1.16, then you bruteforce various potential new numbers repeatedly (probably. In fact, this is how Blizzard accidentally leaked the alpha for one of the WoW expansions, many years ago (and gave us a nice C&D for covering it, RIP). ![]() This is exactly how every fansite has scanned for new patches for years - this is how mmo-champion and wowhead detected new patches when Blizzard was on the old protocol. I mean, it's nothing fancy, but it's just that scanning URLs via bruteforce isn't something that occurs to most people. The disbelievers are cute, but their disbelief is understandable because this is information that isn't really -super- well known.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |