I've read that paper before, its a good read. But how do we apply this?
Unless you have access to the physical machine the server exe is loaded on and running so you can alter the packets coming back from the master server, how is it possible to use out-of-range or in-use keys?