Hi all!
I'm Working on standalone kal sniffer - it will not be based on client directly.
I only want to sniff packets and decode it correctly (without modification).
So... What i need?
Need few packet dumps first raw - from sniffer like wireshark and the same packets decoded by... You :) I know that no one give me working international server packet sniffer based on client hook but I think my request is rational.
Need only few packets started from server choose until char will be loaded.
Now i have some problems, first of all i think they changed old swordcrypt packet encoding/decoding key from 0 to 23 after that i get correct signature $2A (welcome packet) and connection packet but something is wrong... so I want compare it.
Ya I know next packets are encrypted by AES and i think i know how to bite it.
anyone help?
I'm Working on standalone kal sniffer - it will not be based on client directly.
I only want to sniff packets and decode it correctly (without modification).
So... What i need?
Need few packet dumps first raw - from sniffer like wireshark and the same packets decoded by... You :) I know that no one give me working international server packet sniffer based on client hook but I think my request is rational.
Need only few packets started from server choose until char will be loaded.
Now i have some problems, first of all i think they changed old swordcrypt packet encoding/decoding key from 0 to 23 after that i get correct signature $2A (welcome packet) and connection packet but something is wrong... so I want compare it.
Ya I know next packets are encrypted by AES and i think i know how to bite it.
anyone help?