Dissecting the XWM Trojan Kit a Peek at China’S Growing Underground Online Gaming Economy

Total Page:16

File Type:pdf, Size:1020Kb

Dissecting the XWM Trojan Kit a Peek at China’S Growing Underground Online Gaming Economy Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy Trend Micro, Incorporated Lion Gu Senior Threat Researcher A Trend Micro Research Paper I September 2010 Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy CONTENTS Introduction .............................................................................................................................................. 3 XWM Kit Overview .................................................................................................................................... 4 Trojan Generator ...................................................................................................................................... 6 XWM Trojans and Their Components .................................................................................................... 7 Back-End Server ....................................................................................................................................... 9 More About XWM ..................................................................................................................................... 13 Conclusion ................................................................................................................................................14 References ................................................................................................................................................16 2 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy INTRODUCTION As of December 2009, Online games are very popular in China. around 265 million or In fact, as of December 2009, around 68.9 percent of the total 265 million or 68.9 percent of the total number of Internet users number of Internet users in China in China played online played online games. At same time, games. There are there are 750 online game vendors in 750 online game China whose total revenue amounts to vendors in China whose around RMB 25 billion. total revenue amounts to around RMB 25 billion. Players spend not only a lot of time but also money to play online games. To enhance their online gaming experience, players shell out money to purchase virtual assets like gold, artifacts, and the like as well as services like power leveling, gold farming, and others via real money trading (RMT) on several online trading platforms. Most of the online trading platforms are open marketplaces wherein anyone can buy and sell virtual assets or services using convenient payment methods. These have made the RMT market bigger, resulting in a virtual asset revenue of around RMB 34 billion in 2009. Cybercriminals do not want to miss out on a huge opportunity so they created a Trojan kit to steal players’ account credentials and to sell the virtual assets the players have accumulated over time. This allowed the cybercriminals to more easily acquire money and made online gaming Trojans a big security threat in China. The proliferation of online gaming Trojans changed the underground community. New roles in the underground community emerged such as site crackers who insert Trojan download URLs into sites as well as virtual asset stealers and sellers. This research paper introduces a popular online gaming Trojan kit known as the “Xiang Wei Ma (XWM) Kit,” which roughly translates to “Rattle Trojan,” that targets popular online games in China. 3 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy XWM KIT OVERVIEW The XWM Kit includes 21 Trojan generators with back-end server components, each of which targets a popular online game in China. Most of the targeted games are local Chinese online games. Figure 1. XWM Kit Trojan generators The XWM Kit, in particular, targets the following Chinese online games: QQ华夏 or QQ Hua Xia 大话3 or Da Hua 3 QQ华夏 or QQ Hua Xia 大话西游 or Da Hua Xi You QQ幻想 or QQ Huan Xiang 刀剑 or Dao Jian 赤壁 or Chi Bi 地下城勇士 or DNF 传奇外传 or Mir 风火之旅 or Fantasy Journey 4 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy 风云 or Feng Yun 奇迹世界 or Soul of the Ultimate Nation 封神2 or Feng Shen 2 热血江湖 or Re Xue Jiang Hu 剑侠世界 or Jian Xia Shi Jie 天龙八部 or Tian Long 巨人 or Ju Ren 完美世界 or Wan Mei 梦幻西游 or Meng Huan Xi You 问道 or Wen Dao 魔兽 or World of Warcraft The back-end server is a The back-end server is a website that the Trojan sends stolen information to. website that the Trojan Cybercriminals use this site as storage for stolen data, prompting them to call it sends stolen information their “mailbox.” to. Figure 2. XWM Kit’s back-end server components 5 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy TROJAN GENERATOR The XWM Kit’s Trojan generator needs to be configured before it can be used to generate a new Trojan. Users need to input the back-end server’s URL into the kit’s configuration module in order to receive the information that the Trojans they created steal. Figure 3. XWM Kit’s configuration window The said configuration module also has a compression option. This gives users the option to either compress the Trojans they generate or not. The XWM Kit uses a packer called “Upack” to compress the Trojans the malicious users create. Figure 4. Upack is used to compress the Trojans created using the XWM Kit After clicking the Generate button, the XWM Kit will generate a new Trojan, an .EXE file. 6 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy XWM TROJANS AND THEIR COMPONENTS When the XWM Trojans are executed, it drops the following files onto affected systems: • %system32%\{4 random characters}.dll • %system32%\{4 random characters}.cfg • %system32%\drivers\msacpe.sys The malicious routine of XWM Trojans is quite simple. They first drop a .DLL and a .CFG file onto the affected system, both of which use four random characters as names. They then load the .DLL file onto the system’s memory. This file has the following main functions: • Terminate security software processes. It will terminate several processes related to 360, a Chinese security software vendor. • Drop a driver file and create a service related to it. It will drop a driver file named msacpe.sys then create a service named mseqsv that uses the former as image file. This acts as a network sniffer for the malware, allowing it to steal information off an affected system. • Steal online gaming information. To do this, it will search for online gaming configuration files like config.ini, info.ini, and others, which contain the following information: • User names • Online game server names • Areas where the online game servers are located It will then search for processes related to online gaming and read their memory spaces in order to steal the following information: • Game roles • Game levels • Amount of virtual money Once, msacpe.sys finds processes related to its target online games, it will inject its code into the processes then retrieve information such as passwords from the said processes. 7 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy • Send stolen information to the back-end server. It can also send stolen information to the back-end server that the cybercriminals own. It uses the following string as URL argument: ?a=%s&s=%s&u=%s&p=%s&r=%s[%s]&l=%d&m=%d&pin=%s The above-mentioned argument has eight variables, namely: • a = area where the online gaming server is located • s = server name • u = user name • p = password • r = role • l = level • m = virtual money • pin = personal identification number (PIN) code The Trojan will use the said argument to send stolen information back to the back- end server. The msacpe.sys file assists the .DLL file in stealing information. The .CFG file thus only contains the encrypted back-end server’s URL, which is inputted when configuring the Trojan generator. 8 RESEARCH PAPER I DISSECTING THE XWM TROJAN KIT: A PEEK AT CHINA’S UNDERGROUND ONLINE GAMING ECONOMY Dissecting the XWM Trojan Kit A Peek at China’s Growing Underground Online Gaming Economy BACK-END SERVER ASP was Microsoft’s The back-end server receives the information that the Trojan steals. It is a website that first server-side script uses the Active Server Pages (ASP) technology. To test the malware, we set up a site engine for dynamically using Internet Information Services (IIS). As shown, the back-end server requires a user generated Web pages. name and a password to log someone in. Initially released as an add-on to IIS via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows 2000 Server. Figure 5. Back-end server’s login page The back-end server has four main functions, namely: • Checks stolen information • Administers power users • Administers normal users • Reviews the server’s visit history Figure 6. Four main functions of the back-end server 9 RESEARCH
Recommended publications
  • Types of Chinese Swords There Are Generally Five Types of Swords in Chinese History, They Are Jian, Zhanmadao, Liuyedao, Wodao and Yanmaodao
    Types of Chinese Swords There are generally five types of swords in Chinese history, they are Jian, Zhanmadao, Liuyedao, Wodao and Yanmaodao. The jian is a double-edged straight sword used during the last 2,500 years in China. The first Chinese sources that mention the jian date to the 7th century BC during the Spring and Autumn Period;one of the earliest specimens being the Sword of Goujian. Historical one-handed versions have blades varying from 45 to 80 cm (17.7 to 31.5 inches) in length. The weight of an average sword of 70- centimeter (28-inch) blade-length would be in a range of approximately 700 to 900 grams (1.5 to 2 pounds). There are also larger two-handed versions used for training by many styles of Chinese martial arts. The zhanmadao is a saber with a single long broad blade, and a long handle suitable for two-handed use. Dating to 1072, it was used as an anti-cavalry weapon. This is mentioned in the "Wu Jing Zong Yao Song Military Manual" from 1072. Surviving examples include a sword that might resemble a nagamaki in construction; it had a wrapped handle 37 cm long making it easy to grip with two hands. The blade was 114 centimetres long and very straight with a slight curve in the last half. The liuye dao, or "willow leaf saber", is a type of Dao that was commonly used as a military sidearm for both cavalry and infantry during the Ming and Qing dynasties. This weapon features a moderate curve along the length of the blade.
    [Show full text]
  • Bronze Age Swordsmanship: New Insights from Experiments and Wear Analysis
    Journal of Archaeological Method and Theory (2020) 27:1040–1083 https://doi.org/10.1007/s10816-020-09451-0 Bronze Age Swordsmanship: New Insights from Experiments and Wear Analysis Raphael Hermann1 & Andrea Dolfini2 & Rachel J. Crellin3 & Quanyu Wang4 & Marion Uckelmann5 Published online: 17 April 2020 # The Author(s) 2020 Abstract The article presents a new picture of sword fighting in Middle and Late Bronze Age Europe developed through the Bronze Age Combat Project. The project investigated the uses of Bronze Age swords, shields, and spears by combining integrated experi- mental archaeology and metalwork wear analysis. The research is grounded in an explicit and replicable methodology providing a blueprint for future experimentation with, and wear analysis of, prehistoric copper-alloy weapons. We present a four-step experimental methodology including both controlled and actualistic experiments. The experimental results informed the wear analysis of 110 Middle and Late Bronze Age swords from Britain and Italy. The research has generated new understandings of prehistoric combat, including diagnostic and undiagnostic combat marks and how to interpret them; how to hold and use a Bronze Age sword; the degree of skill and training required for proficient combat; the realities of Bronze Age swordplay including the frequency of blade-on-blade contact; the body parts and areas targeted by prehis- toric sword fencers; and the evolution of fighting styles in Britain and Italy from the late 2nd to the early 1st millennia BC. All primary data discussed in the article are available as supplementary material (Appendix) so as to allow scrutiny and validation of the research results.
    [Show full text]
  • Weaponry During the Period of Disunity in Imperial China with a Focus on the Dao
    Weaponry During the Period of Disunity in Imperial China With a focus on the Dao An Interactive Qualifying Project Report Submitted to the Faculty Of the WORCESTER POLYTECHNIC INSTITUTE By: Bryan Benson Ryan Coran Alberto Ramirez Date: 04/27/2017 Submitted to: Professor Diana A. Lados Mr. Tom H. Thomsen 1 Table of Contents Table of Contents 2 List of Figures 4 Individual Participation 7 Authorship 8 1. Abstract 10 2. Introduction 11 3. Historical Background 12 3.1 Fall of Han dynasty/ Formation of the Three Kingdoms 12 3.2 Wu 13 3.3 Shu 14 3.4 Wei 16 3.5 Warfare and Relations between the Three Kingdoms 17 3.5.1 Wu and the South 17 3.5.2 Shu-Han 17 3.5.3 Wei and the Sima family 18 3.6 Weaponry: 18 3.6.1 Four traditional weapons (Qiang, Jian, Gun, Dao) 18 3.6.1.1 The Gun 18 3.6.1.2 The Qiang 19 3.6.1.3 The Jian 20 3.6.1.4 The Dao 21 3.7 Rise of the Empire of Western Jin 22 3.7.1 The Beginning of the Western Jin Empire 22 3.7.2 The Reign of Empress Jia 23 3.7.3 The End of the Western Jin Empire 23 3.7.4 Military Structure in the Western Jin 24 3.8 Period of Disunity 24 4. Materials and Manufacturing During the Period of Disunity 25 2 Table of Contents (Cont.) 4.1 Manufacturing of the Dao During the Han Dynasty 25 4.2 Manufacturing of the Dao During the Period of Disunity 26 5.
    [Show full text]
  • View Book Inside
    YMAA PUBLICATION CENTER YMAA is dedicated to developing the most clear and in-depth instructional materials to transmit the martial legacy. Our books, videos and DVDs are created in collab- oration with master teachers, students and technology experts with a single-minded purpose: to fulfill your individual needs in learning and daily practice. This downloadable document is intended as a sample only. To order this book, please click on our logo which will take you to this product’s page. An order button can be found at the bottom. We hope that you enjoy this preview and encourage you to explore the many other downloadable samples of books, music, and movies throughout our website. Most downloads are found at the bottom of product pages in our Web Store. Did you know? • YMAA hosts one of the most active Qigong and martial arts forums on the internet? Over 5,000 registered users, dozens of categories, and over 10,000 articles. • YMAA has a free quarterly newsletter containing articles, interviews, product reviews, events, and more. YMAA Publication Center 1-800-669-8892 [email protected] www.ymaa.com ISBN671 cover layout 2/14/07 10:17 AM Page 1 Martial Arts/Asian Studies/Military History E1002 A A One-of-a-Kind Reference N for Scholars and Martial Artists C I E Many Martial Artists, once they reach a certain level of proficiency with their N T barehand fighting forms, choose to expand their knowledge to include weapons C techniques. But what weapon to choose? Over the past 5000 years, the Chinese H I have developed a vast array of weapons, built for a multitude of purposes.
    [Show full text]
  • Copyright 2016 Junghwan Maeng
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Illinois Digital Environment for Access to Learning and Scholarship Repository Copyright 2016 Junghwan Maeng DAO AS A VERBAL SUFFIX IN CHINESE VERBS BY JUNGHWAN MAENG THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Arts in East Asian Studies in the Graduate College of the University of Illinois at Urbana-Champaign, 2016 Urbana, Illinois Adviser: Professor Jerome Packard Abstract This thesis focuses on the resultative ending dao as a suffix to Chinese verbs. Although dao is commonly understood as a mono-morphemic verb, a preposition or a verbal complement, little attention has been given to its function as a verbal suffix. This study attempts to highlight the inflectional nature of dao first by elaborating its differences from the virtually synonymous resultative ending jian in the case of perception verbs. Based on a stativity test proposed by Lakoff (1965), it was able to prove that dao has more inflectional features compared to the jian counterpart as it shows higher compatibility with intentionality adverbs and more natural occurrences in imperative contexts. However, since the initial research only deals with a limited amount of perception verbs that allow both jian and dao as a resultative ending, it is insufficient to prove whether dao actually operates as a verbal suffix in other types of perception verbs. Thus, a wider range of perception verbs that do not take jian but dao as a resultative ending were analyzed to explore dao’s inflectional nature to Chinese perception verbs. Using Vendler’s verb classification (1965) and corpus data analysis, it was able to show that dao is the most frequent grammatical morpheme to occur directly after perception verbs and has a function of assigning the feature of achievement verb to the entire verb compound.
    [Show full text]
  • Sword & Stick Society
    Publisher Steven K. Dowd Contributing Writers Emmanuel ES Querubin Dr. Christopher M. Viggiano Louelle Lledo Tristan Jay Mendoza Nickie C. Esmero Contents From the Publishers Desk About Sword Stick Society International Amara Arkanis - Mataw Guro Louelle Lledo Shen Wu Dao - Dr. Christopher M. Viggiano Filipino Blade of Engagement - Way of the Knife FMA East Coast Gatherings 1st FMA Gathering 2nd FMA Gathering 3rd FMA Gathering 4th FMA Gathering Students of Amara Arkanis Rick Argenti David H. McMillan Gary L. Cleveland Tristan Jay Mendoza Warren A. Davenport Renee A. Messina Bill G. Debuque Ronald J. Parente Alan Flordeliza Linda D Roach Bernie Griffin Phil Weathers Christian L. Herrera Remembering Punong Guro Mark Lledo A Tribute to Punong Guro Mark Lledo Mga Mantas ng Amara Arkanis Philippines In Honorable Memory of Guro Mark L. Lledo Condolences Rodrigo “Ding” P. Bago President Elect, Kiwanis Club of Indang - Walang Tinag Punong Guro Ipe Penales, Jr. Guro Isaac Vida Felipe M. Penales Jr. Educational Depot Filipino Martial Arts Digest is published and distributed by: FMADigest 1297 Eider Circle Fallon, Nevada 89406 Visit us on the World Wide Web: www.fmadigest.com The FMAdigest is published quarterly. Each issue features practitioners of martial arts and other internal arts of the Philippines. Other features include historical, theoretical and technical articles; reflections, Filipino martial arts, healing arts and other related subjects. The ideas and opinions expressed in this digest are those of the authors or instructors being interviewed and are not necessarily the views of the publisher or editor. We solicit comments and/or suggestions. Articles are also welcome.
    [Show full text]
  • Anthony Kuntz Martial Arts
    Anthony Kuntz E-mail: [email protected] § MARTIAL ARTS EDUCATION Studied Chinese Kung Fu 2001 - Present Trained in the following styles: - Northern Praying Mantis - Ba Gua Zhang - Ba Ji Quan - Mi Zong Quan - Xiao Lin Quan - Pi Gua Zhang Proficient with the following weapons: - Staff - Straight sword - Broad sword - Double-handed straight sword - Double broad swords - Spear - Miao dao - Long-tasseled sword - Nine section steel whip chain - Monk's spade WORK EXPERIENCE Wu Tang Center for Martial Arts September 2010 — Present Kung Fu Instructor Instructed children at the Chinese Academy of Cleveland. Instructed students of Old Trail Middle School. Assisted in instruction of children at Shaw Jewish Center of Akron. HONORS AND AWARDS Kung fu Tournament Results from 2008 to present: Tournament: 11-29-08 ICKF 2nd International Taichi Chuan Tournament: KAOHSIUNG, Taiwan Awards:3 gold medals, 1 bronze medal, and third place overall team award Events: Anthony Kuntz 1 1. Advanced Hand Forms - Teens 2. Advanced Weapon - Teens Tournament:8-8-09 2nd Annual International Chinese Martial Arts Championship: Las Vegas Awards:4th and 5th Events: 1. Advanced Traditional Hand Forms - Teens 2. Advanced Traditional Long Weapon - Teens Tournament: 10-3-09 International Warrior Hall of Fame Open: Medina, Ohio Awards:3 gold medals Events: 1. Advanced Traditional Hand Forms - Teens 2. Advanced Traditional Long Weapon - Teens 3. Advanced Traditional Short Weapon - Teens Tournament: 12-5-2009 ICMAC World Championship: Nassau, Bahamas Awards:2 gold medals Events: 1. Advanced Traditional Hand Forms - Teens 2. Advanced Traditional Long Weapon - Teens Tournament: 1-23-2010 ICMAC National Kick-off: San Diego Awards:3 gold medals Events: 1.
    [Show full text]
  • Sample File Gladius: Double-Edged Sword of Roman Design Between 65 and 70 Cm Long
    he sword has been an iconic weapon in role-playing games from the earliest days. Who Thasn’t played a game where at least one player played a character wielding a mighty sword — be it a simple longsword, heavy bastard sword, versatile short sword, massive two-handed sword, or dextrous rapier? Swords, in their many flavors and varieties have filled the pages of role-playing games, fantasy books, and other writings for generations. But when you play your games, whether set in far off fantasy lands or in Norman England, do your swords all look alike? What sets one longsword apart from another? Sure, they all do the same amount of damage, but what makes them special? Swords have been around in human history since the Bronze Age, or maybe even earlier. They reached their height of variety and versatility in the European Middle Ages and have found a place among the armies of the world, stretching across Europe, Africa, and Asia. In basic terms, a sword is a bladed (edged) weapon used for cutting and thrusting. The exact definition, style, and name depends on which age of history you are examining and the culture that created the weapon. From saifs, daos, khopesh, katanas, spatha, talwar, and Viking swords to Norman Longswords, Zweihanders, scimitars, rapiers, epee, and cavalry sabers, swords have found a place in our history. These weapons were all designed to meet a specific need for the wielder - whether functional or emotional or both. From purely utilitarian functionality to great works of art, swords run the gamut of form and function, which is probably why they are so important in role-playing games.
    [Show full text]
  • Claymore Free Ebook
    FREECLAYMORE EBOOK Norihiro Yagi | 192 pages | 23 Jun 2011 | Viz Media, Subs. of Shogakukan Inc | 9781421539355 | English | San Francisco, United States Claymore - The history of Clare: Priscilla digs Claymore into her rage during the fight against Teresa. When the Claymore ends, the Claymore called Clare begins her march to battle. The battle against a rare male Awakened Being rages on a mountain from which no Claymore has Claymore returned. As flesh is torn, and despair sets in, Clare surprises her new comrades. If Clare can land one blow against Riful, the Awakened Being will reveal more information about Priscilla. Miles away, Claymore lumbering horde of towering madness is Claymore the march. Looking for a movie the entire family can enjoy? Check out our picks for family friendly movies movies that transcend all ages. For even more, visit our Family Entertainment Guide. See the full list. In a world rife Claymore deadly creatures called "youma", a young silver eyed woman, Clare, works on behalf of an organization that trains female youma halfbreeds into warriors with the ability to destroy these creatures. Considered a rogue for picking up a stray child and almost losing herself to her youma side by "Awakening", she is constantly assigned rather dangerous missions. Written by Anonymous. I've always been a fan of anime series, Claymore favourite being Berserk. I tend to focus a lot on the pacing Claymore the built tension when I watch anime, and Berserk is The master of pacing. Another thing I tend to focus on Claymore character development and overall sentimentality of the show.
    [Show full text]
  • Dao” As Exemplars Bingjun Yang School of Foreign Languages, Shanghai Jiao Tong University, Minhang, Shanghai, China
    JOURNAL OF WORLD LANGUAGES, 2017 VOL. 4, NO. 1, 28–43 https://doi.org/10.1080/21698252.2017.1399955 On translatability from the perspective of Wittgensteinian prototype: translations of “Dao” as exemplars Bingjun Yang School of Foreign Languages, Shanghai Jiao Tong University, Minhang, Shanghai, China ABSTRACT ARTICLE HISTORY Translating Daodejing is quite intricate and prompts much Received 21 November 2016 thinking in translation studies. In order to inquire whether Accepted 31 October 2017 translatability is possible and how we should judge what KEYWORDS might be a good translation, we explore the issue of trans- Translatability; latability from the perspective of Wittgensteinian prototype. Wittgensteinian prototype; Within this perspective, translatability is seen as a category Dao bearing four features: abstractness, integrability, priority, and expansibility. These features not only posit translatabil- ity onto a different stage, but also help adequately explain such phenomena as “Dao” in translation. The abstractness suggests that translatability as a category is more than possible. By integrability, it means the translation of a text usually integrates characteristic elements of possible inter- pretations and understandings. An exemplar which bears many shared features is usually perceived with priority by readers as the good translation. The degree of translatability can be expanded when new translations join in. 1. Introduction Debates on translatability, according to Steiner (1998, 77), may be grouped under two headings: the universalist view and the monadist view. In the universalist view, common human rationality and experience determine the possibility of conveying all possible meanings and thus translation is inherently possible. As was observed by Jakobson, languages “differ essentially in what they must convey and not in what they may convey” (1959/1971, 264) (empha- sis in original).
    [Show full text]
  • Heidegger's Legacy for Comparative Philosophy and the Laozi
    International JournalHeidegger’s of China Legacy Studies for Comparative Philosophy and the Laozi 299 Vol. 11, No. 2, December 2020, pp. 299-318 Heidegger’s Legacy for Comparative Philosophy and the Laozi Thomas Michael* Beijing Normal University Abstract The ancient text known as the Laozi Daodejing is a treasure of Chinese culture and civilization, and it also represents one of the world classics of religion and philosophy. However, it is also a notoriously difficult work to interpret, and modern scholars have exerted tremendous energy in attempting to make an overall sense of just what the text is all about: is it religious or philosophical? Is it a synthetically coherent work with a unified perspective, or an anthology of disparate ideas compiled from multiple sources? Is its main character, the anonymous sage, a master of bodily techniques living in mountain reclusion, or an enlightened ruler who manipulates the Dao from his royal throne to order an empire? The famous German philosopher, Martin Heidegger (1889-1976), himself dabbled in the thought of the Laozi, and in doing so he opened a novel phenomenological reading of the text that rejected the metaphysics traditionally read into it, but his approach had little impact until the discovery of several excavated versions of the ancient manuscript that appear to confirm his phenomenological interpretation. Since then, a growing number of contemporary scholars are accepting, absorbing, and furthering this phenomenological reading of the Laozi, allowing them to make great progress in exploring its religious and philosophical foundations that have deeply influenced Chinese culture and society for more than two thousand years.
    [Show full text]
  • MTEUG003 Front Cover
    Ultimate Three Kingdoms Guide George Matthews (Order #10716398) George Matthews (Order #10716398) Ultimate Three Kingdoms Guide BY Christopher J.N. Banks EDITING Aaron T. Huss, Jeremy Stromberg LAYOUT Aaron T. Huss COVER ART Alexis Puentes/Shutterstock.com INTERIOR ART windmoon/Shutterstock.com, ylq/Shutterstock.com, Wikimedia Commons This game references the Savage Worlds game system, available from Pinnacle Entertainemnt Group at www.pegin.com. Savage Worlds and all associated logos and trademarks are copyrights of Pinnacle Entertainment Group. Used with permission. Pinnacle makes no representation or warranty as to the quality, viability, or suitability for purpose of this product. No portions of this book may be reproduced without the written consent of Mystical Throne Entertainment other than for review of journalistic purposes. © 2013 Mystical Throne Entertainment. All rights reserved. Ultimate Three Kingdoms Guide 1st Edition May 2013 MTEUG004 Permission is granted to print this eBook. No site license if provided. George Matthews (Order #10716398) Contents Legacy of the Dragon 5 Shields 12 History 7 Melee Weapons Table 13 Timeline 7 Ranged Weapons Table 13 Equipment 9 Armor Table 13 Hand Weapons 9 Barding Table (For Horses) 13 Bows 9 Army Tactics 14 Chu-ko-nu 9 Square 14 Crossbows 9 Circle 14 Dao 9 Awl 14 Dagger-axe 10 Flight 14 Guan Dao 10 Basket 14 Gun 10 Hook 14 Jian 10 Eight-Fold Maze 15 Qiang 10 Dispersed 15 Swords 10 Close 15 Tassel 10 Zhanmadao 10 Martial Arts 16 36 Stratagems 16 Vehicles 11 The Three Kingdoms 19 Balista
    [Show full text]