GameCryptography

03/27/2012 01:30 shadowman123#1
well i would like to ask About :-

1 - What Are the AuthPackets and what do they do ? And what is the Password Cryptography Seed and what does it do too .. ?

2 - What is RC5 , Conquer Password Cryptpographer , GameCryptography , Auth cryptography ? what do they do ..And how i can Update them to patch 5570+ ?
03/27/2012 03:42 morphinum#2
03/27/2012 08:42 I don't have a username#3
1. Authpackets are the first packets to handle after sending the password seed, it just authorize the account, hence the name of them. Call them Loginpackets, it would be the same. The last packet for authorizing is 1052 or 0x41c.

2. Rc5 is a cryptography. It's the one they use for password in Conquer. THe Game Cryptography has been changed quite a lot. Basically a cryptographer is used to protect against others to read data. It will change the original data to some other data and in other to receive the original data you will need to decrypt it. To get past patch 5570+ you would need to get the new encryptions. In order to get them you would need to reverse the cryptographer Conquer is currently using, so you would need to learn Reverse Engineering.

If you're interested in Reverse engineering, debugging and cracking, then you might take a look here:
[Only registered and activated users can see links. Click Here To Register...]

At last you could have got all these answers by Google.
03/27/2012 15:00 shadowman123#4
Sounds Fun ...i liked what u said And Understood it well

Thx Dude

But there r stuffs i dont understand which Are :-

1 - Whats is the password Seed , Blowfish

2 - What i understand from u is that they used RC5 to Encrypt their data ..So i found Class Named Password Cryptography , And when i opened it i found Hex Values and it was Named Keys ..So what r they ??

3 - is there More Simple program in reverse engenering insted of ollydbg ??
03/27/2012 15:13 _DreadNought_#5
Blowfish is cipher they used untill from patch 5018->5509

then 5509->5560 the Game Cipher I believe remains CAST5 but with minor changes.

Regarding the Password encryption the RC5 is only used for that.

RC5 cipher was used to decrypt/encrypt password from patch 5187(around there)->5530, the new password cipher(5530 to current patch) remains unknown to all but a few.

OlyDBG is very simple, You shouldnt be using it and reversing the new ciphers yet, Because if you have to ask us how to, you most certianly cant.

#edit
Oh the password seed is a 8 byte packet(contains a random number) the server sends to the client when the client connects to your AuthServer, it basically tells the client everything cool dawg' and without sending this your client will be unable to go any further and will NOT send any data to continue the authorization process untill you do, I believe if you dont send it within 30 seconds? the client will disconnect.
03/27/2012 15:23 teroareboss1#6
Quote:
Originally Posted by _DreadNought_ View Post
Blowfish is cipher they used untill from patch 5018->5509

then 5509->5560 the Game Cipher I believe remains CAST5 but with minor changes.

Regarding the Password encryption the RC5 is only used for that.

RC5 cipher was used to decrypt/encrypt password from patch 5187(around there)->5530, the new password cipher(5530 to current patch) remains unknown to all but a few.

OlyDBG is very simple, You shouldnt be using it and reversing the new ciphers yet, Because if you have to ask us how to, you most certianly cant.

#edit
Oh the password seed is a 8 byte packet(contains a random number) the server sends to the client when the client connects to your AuthServer, it basically tells the client everything cool dawg' and without sending this your client will be unable to go any further and will NOT send any data to continue the authorization process untill you do, I believe if you dont send it within 30 seconds? the client will disconnect.
Blowfish is cipher they used untill from patch 5018->5580 ....
03/27/2012 15:43 CptSky#7
Quote:
Originally Posted by _DreadNought_ View Post
[...]RC5 cipher was used to decrypt/encrypt password from patch 5187(around there)->5530, the new password cipher(5530 to current patch) remains unknown to all but a few.[...]
RC5-32/12/16 is used by TQ since EO... It was used on CO2 since the start. At patch 5180, the key was no longer stored in the application, but sent by the server. With the UInt32, the client initialize set the seed of the random function and generate 16 UInt8 with rand(). These 16 UInt8 are used as the key of the RC5 crypto. Also, there was a new layer that Sparkie released. I can't say anything about it, except that it's a custom layer. At patch 5530, the password cipher has changed completely? I'm no longer wondering of new patches, so :rolleyes:
03/28/2012 00:01 _DreadNought_#8
Yarda Yarda Yarda... I tryed my best to explain all the stuff and get patches right(which is mainly what I got wrong, I was close, okay?!)

But uhh, what they said really ^^

Oh and, Sparkie didnt release any new layer? He only released the RC5 last year..

@terro: No i'm faily sure they changed it to CAST5 at 5509(~ish)