need help with login packet

06/17/2012 19:51 pippop#1
Hi pvpers,
i've read many discussion in this forum about the login packet and the packet is something like this:
Code:
00 37 00 A0 00 00 USERID 00 00 00 20 SESSIONID CLIENT_VERSION 00 00 SERVER
or
Code:
 '0033000700000' + userid + '00000020' + dosid + '0005'+ clientversion
when i sniff packets with wireshark (while i'm doing the normal web login), i don't find any packet of this type.

What i'm doing wrong?
Thank you!
06/17/2012 20:16 deathline4ever#2
You can only find the "packets" of web login with LiveHTTP as example.
And You can only "login" to the game on webpage with "HTTPRequest" or something like that.
06/17/2012 20:18 pippop#3
ok.... so where i can find the tcp login packet? i 'm able to login in the main page... but not in map
06/17/2012 21:01 deathline4ever#4
You Need to make a Socket with the Ipadress from the darkorbit client with the port 8080(Browser Port).
Then First you must send the Packets from this.
Quote:
00 37 00 A0 00 00 USERID 00 00 00 20 SESSIONID CLIENT_VERSION 00 00 SERVER
Then you rec an Packets, you must sniff them againt.
Then you must Develop to rec. The Packets and send the packets.
You need many time for this bot but best regards.

Here UDOBot Source in C++
[Only registered and activated users can see links. Click Here To Register...]
//But doesn´t work anymore because new packets.

You Need to make a Socket with the Ipadress from the darkorbit client with the port 8080(Browser Port).
Then First you must send the Packets from this.
Quote:
00 37 00 A0 00 00 USERID 00 00 00 20 SESSIONID CLIENT_VERSION 00 00 SERVER
Then you rec an Packets, you must sniff them againt.
Then you must Develop to rec. The Packets and send the packets.
You need many time for this bot but best regards.

Here UDOBot Source in C++
[Only registered and activated users can see links. Click Here To Register...]
//But doesn´t work anymore because new packets.

i Hope i have helped you and i hope you can unterstand me because my english isn´t so good.
06/18/2012 17:48 pippop#5
thank you!!! thanks to you i have discovered some problems... now i send packet in right way but... it still not works!!
i have this:
[Only registered and activated users can see links. Click Here To Register...]
the packet that i send is:

Quote:
"003700A00000" + userid_hex_form + "00000020" + SessionID_hex + DOClientVersion + "0000" +server_hex;
maybe clientversion is wrong?
06/18/2012 18:16 ßΙЍȺƦƴßȰȾ#6
"003700A00000" + userid_hex_form + "00000020" + SessionID_hex + DOClientVersion + "0000" +server_hex;

this form is 100% right :)
06/18/2012 18:32 deathline4ever#7
Quote:
Originally Posted by pippop View Post
thank you!!! thanks to you i have discovered some problems... now i send packet in right way but... it still not works!!
i have this:
[Only registered and activated users can see links. Click Here To Register...]
the packet that i send is:


maybe clientversion is wrong?
I don´t know i haved only worked with wireshark 1 time, i can´t say if this is a error or correct.

You find the Client Version in the main swf
[Only registered and activated users can see links. Click Here To Register...]
here download it on your desktop and decompile it.
then you find the version
under
net->
bigpoint->
darkorbit->
main or smthg like that

Then why the other Bot need MD5?
the Main.swf is cryptet with md5 the other bot need them why?
possible this is the problem?
But i don´t know.
06/18/2012 20:53 pippop#8
I think md5 is a sort of checksum to check if something is changed...
Quote:
you find the version
under
net->
bigpoint->
darkorbit->
main
i can't find "main" or similar... do you remember the right path to find clientversion?
thank you!
06/18/2012 20:58 Geralk#9
Quote:
Originally Posted by pippop View Post
I think md5 is a sort of checksum to check if something is changed...

i can't find "main" or similar... do you remember the right path to find clientversion?
thank you!
i think for know client version go to spacemap and then move cursor to '?' help button (dont click) it will show client version
06/19/2012 10:27 pippop#10
Quote:
Originally Posted by ßΙЍȺƦƴßȰȾ View Post
"003700A00000" + userid_hex_form + "00000020" + SessionID_hex + DOClientVersion + "0000" +server_hex;

this form is 100% right :)
for me don't work... so the problem can be in :

userid_hex_form: it's like
05 53 D6 8C
SessionID_hex: it's like
38 32 37 65 35 62 34 31 31 32 35 64
30 37 61 38 30 36 64 34 63 66 35 38 39 33 32 61
39 39 62 34
DOClientVersion:
05352E31322E31
server_hex:
697433

i'm doing something wrong?
06/19/2012 13:48 deathline4ever#11
What doesn´t work?
Your Application?
In which language you develop?
06/19/2012 14:07 bottdo#12
In main.swf you normally won't find any file called "main" or sth. like that since most of the names are unreadable
06/19/2012 14:17 deathline4ever#13
Quote:
Originally Posted by bottdo View Post
In main.swf you normally won't find any file called "main" or sth. like that since most of the names are unreadable
For 1-2 Years before the packets are cryptet the .swf name who stands the version etc. main.swf
06/19/2012 14:37 bottdo#14
Yes the name of the clientfile is still main.swf, but what I wanted to say was if you decompile it, most of the sourcefile names are unreadable
06/19/2012 14:42 WhenAngelsCry`#15
Do was good game now every1 wants hack!!