|
You last visited: Today at 01:07
Advertisement
[Release] Current Cryptography
Discussion on [Release] Current Cryptography within the CO2 PServer Guides & Releases forum part of the CO2 Private Server category.
02/05/2013, 05:57
|
#1
|
elite*gold: 0
Join Date: Aug 2010
Posts: 991
Received Thanks: 1,107
|
[Release] Current Cryptography
Content Removed.
I decided that this forum doesn't deserve or appreciate my work and I am not going to support it by releasing/maintaining my work and generating traffic for it.
|
|
|
02/05/2013, 06:39
|
#2
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
|
Interesting. I had been considering doing a tinnyyy bit of work with the new client so if I ever decide to go ahead with it, this'll be useful.
I assume the legit password cryptography is still private? Not that it really matters seeing as there's a public bypass for it.
|
|
|
02/05/2013, 07:40
|
#3
|
elite*gold: 0
Join Date: Aug 2010
Posts: 991
Received Thanks: 1,107
|
Quote:
Originally Posted by pro4never
I assume the legit password cryptography is still private? Not that it really matters seeing as there's a public bypass for it.
|
Not anymore...
Secure Remote Password protocol - Wikipedia, the free encyclopedia
But they are not using it as is the made some major changes to the implementation... I'm pretty sure they edited WOW's implementation and used it on their servers.
I really can't tell you much about it because i didn't implement it on the server side i only reversed the client side implementation to use it in my clientless bot project which i never finished... And it still laying around somewhere on the hard drive.
|
|
|
02/05/2013, 13:08
|
#4
|
elite*gold: 0
Join Date: May 2011
Posts: 19
Received Thanks: 4
|
"taban lak cristiano, qalbi el sagheer la yat7mal "
thanks adel
|
|
|
02/05/2013, 17:25
|
#5
|
elite*gold: 0
Join Date: Mar 2012
Posts: 29
Received Thanks: 4
|
Thanks friend you is the best...
|
|
|
02/08/2013, 13:06
|
#6
|
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
|
Thanks a lot man.
|
|
|
02/15/2013, 11:56
|
#7
|
elite*gold: 0
Join Date: Feb 2013
Posts: 5
Received Thanks: 3
|
Thank you
|
|
|
02/15/2013, 13:50
|
#8
|
elite*gold: 0
Join Date: Apr 2012
Posts: 58
Received Thanks: 1
|
Thanks Angelius
|
|
|
02/15/2013, 14:11
|
#9
|
elite*gold: 20
Join Date: Jan 2008
Posts: 2,012
Received Thanks: 2,882
|
Quote:
Originally Posted by { Angelius }
Not anymore...
Secure Remote Password protocol - Wikipedia, the free encyclopedia
But they are not using it as is the made some major changes to the implementation... I'm pretty sure they edited WOW's implementation and used it on their servers.
I really can't tell you much about it because i didn't implement it on the server side i only reversed the client side implementation to use it in my clientless bot project which i never finished... And it still laying around somewhere on the hard drive.
|
Yeah, they do the sha1-interleave.
|
|
|
02/15/2013, 15:46
|
#10
|
elite*gold: 0
Join Date: Mar 2005
Posts: 1,425
Received Thanks: 1,565
|
plus there is a bug in any c# implementation that stops it from working half of the time, well tq bugged the official implementation should i say.
|
|
|
02/15/2013, 16:26
|
#11
|
elite*gold: 0
Join Date: Jan 2008
Posts: 1,434
Received Thanks: 1,147
|
Quote:
Originally Posted by Ultimation
plus there is a bug in any c# implementation that stops it from working half of the time, well tq bugged the official implementation should i say.
|
Could be uninitialized variables When I reverse TQ's file formats, I often face 0xCD values which correspond to Visual Studio memory indicator... So, ****** implementations on their side...
|
|
|
02/15/2013, 18:05
|
#12
|
elite*gold: 0
Join Date: Mar 2005
Posts: 1,425
Received Thanks: 1,565
|
u got the updated spawn packet (0x271E), they added something new now my entites arnt showing, cnat find the new values they added /removed?
nevermind got it, 2 new bytes before x,y
|
|
|
02/17/2013, 18:40
|
#13
|
elite*gold: 0
Join Date: Jun 2007
Posts: 32
Received Thanks: 5
|
this is the update for ur evolution project? if so, the only 16 bit word in ur source code which looked like "the game key" to me was in this line:
#pragma comment(linker,"/manifestdependency:\"type='win32' name='Microsoft.Windows.Common-Controls' version='6.0.0.0' processorArchitecture='x86' publicKeyToken='6595b64144ccf1df' language='*'\"")
when i try to change that word with the new one, i get errors while debugging ( i dont even know what #pragma comment function is). so the general question is, where in ur source code should i update the new encrypt key?
Tnx
|
|
|
02/17/2013, 21:06
|
#14
|
elite*gold: 0
Join Date: Jan 2006
Posts: 1,055
Received Thanks: 296
|
Quote:
Originally Posted by dusica
( i dont even know what #pragma comment function is)
|
it`s not a comment, it`s used to send directives to the compiler. It can also be used for other neat **** like disabling some warnings during the run time.
|
|
|
02/17/2013, 23:20
|
#15
|
elite*gold: 0
Join Date: Jun 2007
Posts: 32
Received Thanks: 5
|
so that means i should insert the new encrypt key somewhere else in his source code i guess ... only if i had a little more knowledge ... Thank you for that info
|
|
|
|
|
Similar Threads
|
[Release] The New Cryptography [Cast-128/Cast-5]
08/10/2011 - CO2 PServer Guides & Releases - 53 Replies
That's right... I decided to because everyone who shouldn't have it has already figured it out... and it's starting to spread quickly. There really isn't any reason to keep it secret anymore. Noobs that get hold of it can't code the patch anyways.
Open where your Blowfish is...
You'll see the "BF_set_key" and "BF_cfb64_encrypt" voids.
Replace those with "CAST_set_key" and "CAST_cfb64_encrypt".
The new key for it is "BC234xs45nme7HU9".
Done.
|
[Release]5017 Password Cryptography
06/22/2011 - CO2 PServer Guides & Releases - 10 Replies
-5017+
Will work with Lower Versions but not all
Will work with Higher versions but not all
Create a new .cs file if you wish and paste this class:
|
[Release] Current .CT
08/01/2009 - Shaiya Hacks, Bots, Cheats & Exploits - 2 Replies
Well guys dont know if there has been an update, i just noticed its telling me other client version.. so yea my client isnt working anymore.. My pc totaly crashed and yea.. soon il be in italy for 2 weeks.
Il release my current ct now it includes teleport, range, climb, speed and so on.. i hope it will work for you guys
|
All times are GMT +2. The time now is 01:07.
|
|