Authentication Sequence

05/17/2012 16:42 konsowa#1
Hey epvpers, i just wanted to know what the latest auth sequence was in terms of packet ids, just so i can check if what ive done is correct or not.

Thank You.
05/17/2012 19:49 Spirited#2
If it works, then it's right. If it doesn't, then it's not.
05/17/2012 20:03 konsowa#3
Okay..So ive manged to decrypt the authentication packets what do i need to do to the decrypt the game packets??
05/17/2012 21:53 Kiyono#4
Quote:
Originally Posted by konsowa View Post
Okay..So ive manged to decrypt the authentication packets what do i need to do to the decrypt the game packets??
Game encryption?
05/17/2012 23:03 pro4never#5
Quote:
Originally Posted by konsowa View Post
Okay..So ive manged to decrypt the authentication packets what do i need to do to the decrypt the game packets??
You're going to receive little if any help...

Password encryption is... very highly private right now (basically all the paid bots wanting to maintain market share)

New DHKeyExchange to set up game encryption is... starting to become more wildly available but is still not public information.

You're prob best off taking some time to learn reverse engineering so you can either figure out the new encryption out of the client, or be comfortable bypassing it through hooking the client (if your goal is not related to official servers).
05/17/2012 23:57 konsowa#6
Does conquer have a specific function that decrypts/encrypts the the packets if so would i be able to hook it and some how use it in my favor?

And yea this is for the official servers.

oh and u mentioned learning reverse engineering. can u link me to some tutorials?
05/18/2012 00:29 Kiyono#7
Quote:
Originally Posted by konsowa View Post
Does conquer have a specific function that decrypts/encrypts the the packets if so would i be able to hook it and some how use it in my favor?

And yea this is for the official servers.

oh and u mentioned learning reverse engineering. can u link me to some tutorials?
For hooking, have you checked out this? [Only registered and activated users can see links. Click Here To Register...]
05/18/2012 00:37 konsowa#8
I know that that exists but the way im doing my hooking is thru detours.
Basically i inject a dll that hooks the clients functions as of now i have hooked 4 functions the send, recv, Connect, and ShellExecute.
In my connect function i change the ip/port that the client connects to to my ip/port and thus i have all the packets going thru my proxy. I managed to find a auth decryption/encryption method posted here on epvp which works but what i have failed at doing is converting these decrypted packets to strings, which wud normally be something like Encoding.ASCII.GetString(Packet) but it does not give me the expected results :/
05/18/2012 04:58 pro4never#9
Quote:
Originally Posted by konsowa View Post
I know that that exists but the way im doing my hooking is thru detours.
Basically i inject a dll that hooks the clients functions as of now i have hooked 4 functions the send, recv, Connect, and ShellExecute.
In my connect function i change the ip/port that the client connects to to my ip/port and thus i have all the packets going thru my proxy. I managed to find a auth decryption/encryption method posted here on epvp which works but what i have failed at doing is converting these decrypted packets to strings, which wud normally be something like Encoding.ASCII.GetString(Packet) but it does not give me the expected results :/
If you hook in the right places, you can get the pre-encrypted packets for sending and post-decrypted packets for the receiving side of things.

That's what is covered in the example hawtness posted. Basically it lets you bypass all the encryption side of things and just focus on writing your bot.

Also... what are you expecting to see when doing Encoding.ASCII.GetString? That's only going to return the ASCII representation of the various bytes in the array (which, unless there's a string inside the packet will look like jibberish)

Here's an example packet log from ages ago. Note how the only thing in the ascii side that's plain text (in most cases) is just the server seal? That's because the rest is not in a string format at any point.

[Only registered and activated users can see links. Click Here To Register...]