Anybody here willing to share some basic tutorial on how to reverse engineer the current encryption? :D
The proxy of p4n doesn't connect (For me it doesn't) its stuck at gameserver.Quote:
i haven't been updating my proxy for a long long time ( a good 6 months+ ). I dropped it cuz java 6 doesn't support true async socket back then.
I thought pro4never's proxy paradise contains the current encryptions, no ?
I read through your post, kinda useful. But i also think what cyanogen has said is correct. I remember searching for strings like "TQServer" and "TQClient", and i found the DH default keys...Quote:
Yeah there is, search I released it myself.
#edit
[Only registered and activated users can see links. Click Here To Register...]
That isnt the exact current encryption, that was how I figured out the current blowfish one, they added something new which you CAN find using that tut. implemention is harder.
Did YOU find and implement the newest additions? Just looking for some hope.Quote:
Yeah there is, search I released it myself.
#edit
[Only registered and activated users can see links. Click Here To Register...]
That isnt the exact current encryption, that was how I figured out the current blowfish one, they added something new which you CAN find using that tut. implemention is harder.
This method of going about wouldn't help in the slightest way with what they currently have (but it is always good check the shortest route first in these kinds of situations).Quote:
Yeah there is, search I released it myself.
#edit
[Only registered and activated users can see links. Click Here To Register...]
That isnt the exact current encryption, that was how I figured out the current blowfish one, they added something new which you CAN find using that tut. implemention is harder.
I do know the newest implements and have example implementation codes.Quote:
Did YOU find and implement the newest additions? Just looking for some hope.