Lets stop this WPE Pro Crap right now.......

04/13/2009 18:24 NovaCygni#16
Quote:
Originally Posted by boo_esb View Post
All this accumulated energy is bad. Everyone should relax . And stop flaming! True that you guys are very smart. In your own areas! I have a degree in environmental engineering with a masters in dairy effluent treatment so i kind of bet no one knows so much as me in that area. The forum was made to help people share their knowledge in the matters they so choose. If someone, ANYONE whoever they are start advertising their knowledge and saying others are wrong, just for expressing ill conceived opinions no one will ever learn anything. Then the forum will close!
Im sorry for off -topic (being known for making off topic is not my aspiration) but if i want a flame zone i go watch a soccer match :P
Sorry once again.
Boo
Ahh weve spoken on msn now anyways, turns out he misinterprited the meaning of the first thread, turns out we both agreed and knew about WPE not being useable for Cabal as a viable hack tool ^^
04/16/2009 08:37 bihasa110304#17
@nova

can you prove WPE pro + cabal = account banned?

ill believe you if you have a proof.
04/16/2009 21:11 NovaCygni#18
Quote:
Originally Posted by bihasa110304 View Post
@nova

can you prove WPE pro + cabal = account banned?

ill believe you if you have a proof.
:rolleyes: I care because? If your to educationally challenged to understand the intelligent arguements put before you, and are so "Tech-Retarded" that you cant bother Googling about WPE and Encrypted game packets then why would I care if you get your account banned? [Only registered and activated users can see links. Click Here To Register...] is all the proof you should need...
04/17/2009 11:57 dlnqt#19
You have to believe NovaCygni. He knows what he is talking about. :) Well in our server bihasa, it wouldn't be an instant ban, since I recently tried sending packets to the server and being disconnected a lot of times. Maybe it will take a while for my account to get banned, or maybe Cabal PH doesn't have the kind of security that NovaCygni's server has.
04/17/2009 13:13 NovaCygni#20
Quote:
Originally Posted by dlnqt View Post
You have to believe NovaCygni. He knows what he is talking about. :) Well in our server bihasa, it wouldn't be an instant ban, since I recently tried sending packets to the server and being disconnected a lot of times. Maybe it will take a while for my account to get banned, or maybe Cabal PH doesn't have the kind of security that NovaCygni's server has.
PH Probably counts the malformed packet as a "Corruption" error... Enough of these though and you Will be banned (* PH probably has more leniancy than CabalEU or CabalNA *)
04/17/2009 13:22 bihasa110304#21
hmm ok i believe u WPe is not reliable for cabal.

OT :
sum one in ph is duping Tita blades,gs,daikata,.perstyn, 2slot .etc
04/17/2009 23:53 NovaCygni#22
Quote:
Originally Posted by bihasa110304 View Post
hmm ok i believe u WPe is not reliable for cabal.

OT :
sum one in ph is duping Tita blades,gs,daikata,.perstyn, 2slot .etc
That is being done with Packets... the Tool there using to do it is called a "Proxy-Bot" and has been made to Encrypt and Decrypt the games packets with there own UNIQUE method (* Its absence of this feature that makes WPE-Pro not viable for this purpose.. it cannot be used for ANY Encrypted packets! Because what you see is NOT what is because of Encryption! *)
11/14/2009 05:26 Aequeo#23
If any of you guys could think outside of the box, you would know that you don't even Decrypt the packets. Think about it, what would you have to do, that doesn't involve you decrypting the packet, to get the original packet?

That should be a huge hint for every one of you.
11/15/2009 15:54 .Kreative#24
Well, only thing i can think of is getting to the packet before it gets encrypted.
12/01/2009 23:07 2120057678#25
everything is posible.. f they do that..then dirs a way we can hehhe... just learning about wpe..
12/03/2009 09:12 cobr_h#26
Well, if there is an use for this WPE thing, it could be, knowing the negotiated key during the beginning of the game connection session, and now knowing that variation of whatever-crypting-algorythm, use some kind of script to pick um the packet with WPE, open it, change what is wanted, then pack it back and send thru. Heh, nothing I could wonder how to do as I don't even know how this WPe looks like. ;)
12/03/2009 14:56 Pupix#27
Quote:
Originally Posted by cobr_h View Post
Heh, nothing I could wonder how to do as I don't even know how this WPe looks like. ;)
1.Kill NovaCygni
2.Steal his/her/it brain
3.Attach it to your XD
4. .......
5. profit !
12/12/2009 13:52 anteater123#28
#infraction
12/17/2009 00:28 NovaCygni#29
Quote:
Originally Posted by cobr_h View Post
Well, if there is an use for this WPE thing, it could be, knowing the negotiated key during the beginning of the game connection session, and now knowing that variation of whatever-crypting-algorythm, use some kind of script to pick um the packet with WPE, open it, change what is wanted, then pack it back and send thru. Heh, nothing I could wonder how to do as I don't even know how this WPe looks like. ;)
Encryption method... ;)

For getting to the packets before there encrypted...
[Only registered and activated users can see links. Click Here To Register...]



Code:
namespace Ant1_V3n0M
{
    class Encryption
    {
        public byte[] MainKey;
        uint[] Keys2 = { 0xFFFFFFFF, 0xFFFFFF00, 0xFFFF0000, 0xFF000000 };
        public void Decrypt(ref byte[] packet)
        {
            uint size = (uint)packet.Length;
            Array.Resize(ref packet, packet.Length + 4);
            uint i = 4;
            uint Key = BitConverter.ToUInt32(MainKey, (BitConverter.ToInt32(packet, 0) & 0x3FFF) * 4);
            BitConverter.GetBytes(BitConverter.ToInt32(packet, 0) ^ 0x7AB38CF1).CopyTo(packet, 0);
            uint t = (size - 4) >> 2; //Shift right 2 = divide by 4
            uint t1;
            while (t > 0)
            {
                t1 = BitConverter.ToUInt32(packet, (int)i);
                Key = Key ^ t1;
                BitConverter.GetBytes(Key).CopyTo(packet, i);
                t1 = t1 & 0x3FFF;
                Key = BitConverter.ToUInt32(MainKey, (int)(t1 * 4));
                i += 4;
                t--;
            }
            t1 = Keys2[((size - 4) & 3)];
            t1 = ~t1;
            t1 = t1 & Key;
            BitConverter.GetBytes(BitConverter.ToUInt32(packet, (int)i) ^ t1).CopyTo(packet, i);
            Array.Resize(ref packet, (int)size);
        }
        public struct PacketInfo
        {
            public uint Key; //Encryption basekey
            public uint Step; //Encryption Step
            public uint Mul; //Encryption Multiplier
            public PacketInfo(bool setup)
            {
                Key = 0x6EC03CB4;
                Step = 0;
                Mul = 1;
            }
        }
        public void Encrypt(ref byte[] packet, ref PacketInfo PI)
        {
            uint size = (uint)packet.Length;
            Array.Resize(ref packet, packet.Length + 4);
            if (size < 0x0A)
                return;
            BitConverter.GetBytes(BitConverter.ToInt32(packet, 0) ^ PI.Key).CopyTo(packet, 0);
            uint Key = (BitConverter.ToUInt32(packet, 0) & 0x3FFF) * (uint)PI.Mul;
            Key = BitConverter.ToUInt32(MainKey, (int)(Key * 4));
            uint t = (size - 8) >> 2; //Shift right 2 = divide by 4
            uint t1;
            uint i = 8;
            while (t > 0)
            {
                t1 = BitConverter.ToUInt32(packet, (int)i);
                t1 = t1 ^ Key;
                BitConverter.GetBytes(t1).CopyTo(packet, i);
                t1 = (t1 & 0x3FFF) * (uint)PI.Mul;
                Key = BitConverter.ToUInt32(MainKey, (int)(t1 * 4));
                i += 4;
                t--;
            }
            t1 = Keys2[((size - 8) & 3)];
            t1 = ~t1;
            uint t2 = (t1 & Key) ^ BitConverter.ToUInt32(packet, (int)i);
            BitConverter.GetBytes(t2).CopyTo(packet, i);
            Array.Resize(ref packet, packet.Length - 4);
            t1 = (Key & 0x3FFF) * (uint)PI.Mul;
            t1 = t2 ^ BitConverter.ToUInt32(MainKey, (int)(t1 * 4));
            BitConverter.GetBytes(t1).CopyTo(packet, 4);
            PI.Step = ((PI.Step + 1) & 0x3FFF);
            PI.Key = BitConverter.ToUInt32(MainKey, (int)((PI.Step * PI.Mul) * 4));
        }
    }
}
12/22/2009 11:31 -Chrome-#30
I know C++ but your code there is still chinese!