Reverse Crypt Systems [Tips/Hints/Tuts needed]]

02/28/2012 03:38 samehvan#1
Hello PVPers,

So the Title says it all, Since i came here and i am trying to learn how to be a good Coder and Co2 P.Server Specially , i guess i dd well so far but i'v noticed that all my prev experience ddnt came near Encrypting/Decrypting systems , i also aware of that most of good coders around here are very busy coding stuff and so ,i was away for sometime and about 2 months ago i came back from AD (work trip) and a friend asked for an up to date P.Server , actually i miss that fun so i said ok, i will try , but since that new Patch has a new cryptography system i couldn't yet start :P , i have read 3 books about the Cryptography systems without any clue , as i said it's a completely new field for me , so i thought i can ask the Experts (if anyone have some spare time) to lead me the way , i would really appreciate any help , i also may help (if i could) with any projects
waiting for those who are kind enough and have the time to give a tip or even books that are good enough to learn that type of coding

thanks for you all
02/28/2012 12:48 I don't have a username#2
Reverse engineering would be your first call to crack the encryption.
02/28/2012 16:09 _DreadNought_#3
Hate to say it but the new password cryptography might be abit hard for a beginner.(Sparkie failed too, so I hear and hes been coding and cracking for like 13 years now?) Anyway if you insist on trying you would find the encryption routines in the client using olydbg and then try and figure out what in front of you means, and write it up in C#.

But honestly take my advice, it would be 100x easier to just use detours and go over the encryption itself.
02/28/2012 22:57 samehvan#4
alr8, calm down heroes , i think it doesnt even worth arguing , and guess what ?

after 13s posts i found no useful info , please guys focus on the thread point ,

@InfamousNoone
seems you are very good at this stuff , do you mind light our minds with a pic of info or tip ?

@Korvacs
i have always consider you as a great supporter , i guess something bad happened so u decided not to share anything anymore (i don't mind that , it's your r8 anyway), i just hope you have something here that you can share
02/28/2012 23:55 _DreadNought_#5
Fact is, noone is going to release any information about it in public.

The best info I can give you is; The inital authorization packet has changed, Has a new length(240) and a new ID, 1120 or something similar.
02/29/2012 00:20 Korvacs#6
I feel it should be noted again that i dont have the latest encryption and know nothing about it, i stated this in your last thread about this..
02/29/2012 12:26 Kiyono#7
Well lets leave Sparkie and whatever he does out of here. This thread is about the samehvan's problem not Sparkie's.
02/29/2012 18:58 samehvan#8
Quote:
Originally Posted by _DreadNought_ View Post
Fact is, noone is going to release any information about it in public.
The best info I can give you is; The inital authorization packet has changed, Has a new length(240) and a new ID, 1120 or something similar.
Quote:
Originally Posted by Korvacs View Post
I feel it should be noted again that i dont have the latest encryption and know nothing about it, i stated this in your last thread about this..
i ddn't mean i need the latest encryption , i just wanted infos/tips/books , any methods about how to reverse or crack the encryption systems and methods , specially when you have the keys and original text
03/01/2012 09:11 Lateralus#9
Run the client through a debugger, put a breakpoint when a character logs in at first, step through calls until you find where the entered password is pushed as an argument to a call - chances are that you'll find the password crypto in that routine... Carefully step through and analyze what it's doing while translating to a higher level language. Do the same for whatever else they have changed.

Finding the routine is the real problem. After you find it, you're basically set. Just takes some time.