Register for your free account! | Forgot your password?

You last visited: Today at 01:07

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Release] Current Cryptography

Discussion on [Release] Current Cryptography within the CO2 PServer Guides & Releases forum part of the CO2 Private Server category.

Reply
 
Old   #1
 
{ Angelius }'s Avatar
 
elite*gold: 0
Join Date: Aug 2010
Posts: 991
Received Thanks: 1,107
[Release] Current Cryptography

Content Removed.
I decided that this forum doesn't deserve or appreciate my work and I am not going to support it by releasing/maintaining my work and generating traffic for it.
{ Angelius } is offline  
Thanks
20 Users
Old 02/05/2013, 06:39   #2
 
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
Interesting. I had been considering doing a tinnyyy bit of work with the new client so if I ever decide to go ahead with it, this'll be useful.


I assume the legit password cryptography is still private? Not that it really matters seeing as there's a public bypass for it.
pro4never is offline  
Old 02/05/2013, 07:40   #3
 
{ Angelius }'s Avatar
 
elite*gold: 0
Join Date: Aug 2010
Posts: 991
Received Thanks: 1,107
Quote:
Originally Posted by pro4never View Post
I assume the legit password cryptography is still private? Not that it really matters seeing as there's a public bypass for it.
Not anymore...

Secure Remote Password protocol - Wikipedia, the free encyclopedia

But they are not using it as is the made some major changes to the implementation... I'm pretty sure they edited WOW's implementation and used it on their servers.

I really can't tell you much about it because i didn't implement it on the server side i only reversed the client side implementation to use it in my clientless bot project which i never finished... And it still laying around somewhere on the hard drive.
{ Angelius } is offline  
Thanks
6 Users
Old 02/05/2013, 13:08   #4
 
elite*gold: 0
Join Date: May 2011
Posts: 19
Received Thanks: 4
"taban lak cristiano, qalbi el sagheer la yat7mal "
thanks adel
M.Dego is offline  
Old 02/05/2013, 17:25   #5
 
elite*gold: 0
Join Date: Mar 2012
Posts: 29
Received Thanks: 4
Thanks friend you is the best...
Adventure-MMO is offline  
Old 02/08/2013, 13:06   #6
 
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
Thanks a lot man.
xmen01235 is offline  
Old 02/15/2013, 11:56   #7
 
JasonSx's Avatar
 
elite*gold: 0
Join Date: Feb 2013
Posts: 5
Received Thanks: 3
Thank you
JasonSx is offline  
Old 02/15/2013, 13:50   #8
 
elite*gold: 0
Join Date: Apr 2012
Posts: 58
Received Thanks: 1
Thanks Angelius
Mero.El.Omda is offline  
Old 02/15/2013, 14:11   #9
 
InfamousNoone's Avatar
 
elite*gold: 20
Join Date: Jan 2008
Posts: 2,012
Received Thanks: 2,882
Quote:
Originally Posted by { Angelius } View Post
Not anymore...

Secure Remote Password protocol - Wikipedia, the free encyclopedia

But they are not using it as is the made some major changes to the implementation... I'm pretty sure they edited WOW's implementation and used it on their servers.

I really can't tell you much about it because i didn't implement it on the server side i only reversed the client side implementation to use it in my clientless bot project which i never finished... And it still laying around somewhere on the hard drive.
Yeah, they do the sha1-interleave.
InfamousNoone is offline  
Old 02/15/2013, 15:46   #10
 
Ultimation's Avatar
 
elite*gold: 0
Join Date: Mar 2005
Posts: 1,425
Received Thanks: 1,565
plus there is a bug in any c# implementation that stops it from working half of the time, well tq bugged the official implementation should i say.
Ultimation is offline  
Old 02/15/2013, 16:26   #11


 
CptSky's Avatar
 
elite*gold: 0
Join Date: Jan 2008
Posts: 1,434
Received Thanks: 1,147
Quote:
Originally Posted by Ultimation View Post
plus there is a bug in any c# implementation that stops it from working half of the time, well tq bugged the official implementation should i say.
Could be uninitialized variables When I reverse TQ's file formats, I often face 0xCD values which correspond to Visual Studio memory indicator... So, ****** implementations on their side...
CptSky is offline  
Old 02/15/2013, 18:05   #12
 
Ultimation's Avatar
 
elite*gold: 0
Join Date: Mar 2005
Posts: 1,425
Received Thanks: 1,565
u got the updated spawn packet (0x271E), they added something new now my entites arnt showing, cnat find the new values they added /removed?

nevermind got it, 2 new bytes before x,y
Ultimation is offline  
Old 02/17/2013, 18:40   #13
 
dusica's Avatar
 
elite*gold: 0
Join Date: Jun 2007
Posts: 32
Received Thanks: 5
this is the update for ur evolution project? if so, the only 16 bit word in ur source code which looked like "the game key" to me was in this line:
#pragma comment(linker,"/manifestdependency:\"type='win32' name='Microsoft.Windows.Common-Controls' version='6.0.0.0' processorArchitecture='x86' publicKeyToken='6595b64144ccf1df' language='*'\"")


when i try to change that word with the new one, i get errors while debugging ( i dont even know what #pragma comment function is). so the general question is, where in ur source code should i update the new encrypt key?
Tnx
dusica is offline  
Old 02/17/2013, 21:06   #14
 
Silent-Death's Avatar
 
elite*gold: 0
Join Date: Jan 2006
Posts: 1,055
Received Thanks: 296
Quote:
Originally Posted by dusica View Post
( i dont even know what #pragma comment function is)
it`s not a comment, it`s used to send directives to the compiler. It can also be used for other neat **** like disabling some warnings during the run time.
Silent-Death is offline  
Thanks
1 User
Old 02/17/2013, 23:20   #15
 
dusica's Avatar
 
elite*gold: 0
Join Date: Jun 2007
Posts: 32
Received Thanks: 5
so that means i should insert the new encrypt key somewhere else in his source code i guess ... only if i had a little more knowledge ... Thank you for that info
dusica is offline  
Reply


Similar Threads Similar Threads
[Release] The New Cryptography [Cast-128/Cast-5]
08/10/2011 - CO2 PServer Guides & Releases - 53 Replies
That's right... I decided to because everyone who shouldn't have it has already figured it out... and it's starting to spread quickly. There really isn't any reason to keep it secret anymore. Noobs that get hold of it can't code the patch anyways. Open where your Blowfish is... You'll see the "BF_set_key" and "BF_cfb64_encrypt" voids. Replace those with "CAST_set_key" and "CAST_cfb64_encrypt". The new key for it is "BC234xs45nme7HU9". Done.
[Release]5017 Password Cryptography
06/22/2011 - CO2 PServer Guides & Releases - 10 Replies
-5017+ Will work with Lower Versions but not all Will work with Higher versions but not all Create a new .cs file if you wish and paste this class:
[Release] Current .CT
08/01/2009 - Shaiya Hacks, Bots, Cheats & Exploits - 2 Replies
Well guys dont know if there has been an update, i just noticed its telling me other client version.. so yea my client isnt working anymore.. My pc totaly crashed and yea.. soon il be in italy for 2 weeks. Il release my current ct now it includes teleport, range, climb, speed and so on.. i hope it will work for you guys



All times are GMT +2. The time now is 01:07.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.