Help with packets

07/05/2013 14:31 Kardromidoon#1
Hi,

Could anyone help me with the following? (its abstract stuff)

The following knowledge i got already:

War Rock runs its login here:

tcp://server_ip_wr:5330

to login you need to send a package with code 4352 with a timestamp:

TIMESTAMP 4352 10-char-long-RANDOMNUMBER 0 NICKNAME MYRANDOMNUMBERAGAIN NICKNAME ???? 1 0 NP12:auth01:0:MYRANDOMNUMBERAGAIN:SOMERANDOMLONGAU THKEY

What is "????"?
What is the difference between auth01, auth02, auth03 and auth04?

How do i get that SOMERANDOMLONGAUTHKEY

You get the following as return

TIMESTAMP 4352 1 10-char-long-RANDOMNUMBER 0 LOGINNICK MYRANDOMNUMBERAGAIN INGAMENICK 1 0 256103 0 1.1268 -1 INVALID -1 -1 -1 -1 0 -1 2 203 WORLDIP_WORLD 5340 2576 0 204 WEST IP_WEST 5340 106 0
What is the 1.1268 ? Is it a random number too (from 1-3 with 4 digits after decimal point?) Is it connected with, where I want to connect to?

thats right?

To crypt the packages and send them to the server I need xOR with key 0xC3?
Okay after that im logged in, right? I need to send data to tcp//wr_serv_ip:5340 now?

Also I need to send every 5 seconds a im_alive_check with style: "packet_alive_code TIMESTAMP"

I can send data from the userlist by adressing a packet code like that:
"packet_userlist_code TIMESTAMP (1: Nickname, 2: Clan, 3: Levelrange) VALUE" (i think its that style?)

How and where do I get data now returned?

Would be cool if you could help me :-)

Addition: Nexon seems to use that auth01 stuff as cookie on their website too. I need to logon warrock eu and post that authkey in the loginpacket ?
07/05/2013 14:49 Xave :)#2
Quote:
Originally Posted by Kardromidoon View Post
Hi,

Could anyone help me with the following? (its abstract stuff)

The following knowledge i got already:

War Rock runs its login here:

tcp://server_ip_wr:5330

to login you need to send a package with code 4352 with a timestamp:

TIMESTAMP 4352 10-char-long-RANDOMNUMBER 0 NICKNAME MYRANDOMNUMBERAGAIN NICKNAME ???? 1 0 NP12:auth01:0:MYRANDOMNUMBERAGAIN:SOMERANDOMLONGAU THKEY

What is "????"?
What is the difference between auth01, auth02, auth03 and auth04?

How do i get that SOMERANDOMLONGAUTHKEY

You get the following as return

TIMESTAMP 4352 1 10-char-long-RANDOMNUMBER 0 LOGINNICK MYRANDOMNUMBERAGAIN INGAMENICK 1 0 256103 0 1.1268 -1 INVALID -1 -1 -1 -1 0 -1 2 203 WORLDIP_WORLD 5340 2576 0 204 WEST IP_WEST 5340 106 0
What is the 1.1268 ? Is it a random number too (from 1-3 with 4 digits after decimal point?) Is it connected with, where I want to connect to?

thats right?

To crypt the packages and send them to the server I need xOR with key 0xC3?
Okay after that im logged in, right? I need to send data to tcp//wr_serv_ip:5340 now?

Also I need to send every 5 seconds a im_alive_check with style: "packet_alive_code TIMESTAMP"

I can send data from the userlist by adressing a packet code like that:
"packet_userlist_code TIMESTAMP (1: Nickname, 2: Clan, 3: Levelrange) VALUE" (i think its that style?)

How and where do I get data now returned?

Would be cool if you could help me :-)

Addition: Nexon seems to use that auth01 stuff as cookie on their website too. I need to logon warrock eu and post that authkey in the loginpacket ?
Code:
TIMESTAMP 4352 10-char-long-RANDOMNUMBER 0 NICKNAME MYRANDOMNUMBERAGAIN NICKNAME ???? 1 0 NP12:auth01:0:MYRANDOMNUMBERAGAIN:SOMERANDOMLONGAUTHKEY
auth01-05 = The Server wich is authentification You (W E B)
10-char-long-RND = Your password ( Crypted SomeWay )
SOMERANDOMLONGAUTHKEY = Cookie ( NPP ) When you login @http://passport.nexoneu.com
???? = Some Korean Symbols ( Kept from NexonKR )
1.1268 = This is and Authentification Code wich is Used at Characterinfo packet ( 25088 ) if it's wrong warrock will return : 25088 90030 ( Login Normal way )
07/05/2013 15:51 Kardromidoon#3
Quote:
Originally Posted by Xave :) View Post
Code:
TIMESTAMP 4352 10-char-long-RANDOMNUMBER 0 NICKNAME MYRANDOMNUMBERAGAIN NICKNAME ???? 1 0 NP12:auth01:0:MYRANDOMNUMBERAGAIN:SOMERANDOMLONGAUTHKEY
auth01-05 = The Server wich is authentification You (W E B)
10-char-long-RND = Your password ( Crypted SomeWay )
SOMERANDOMLONGAUTHKEY = Cookie ( NPP ) When you login @http://passport.nexoneu.com
???? = Some Korean Symbols ( Kept from NexonKR )
1.1268 = This is and Authentification Code wich is Used at Characterinfo packet ( 25088 ) if it's wrong warrock will return : 25088 90030 ( Login Normal way )
So the auth server is automaticly assigned by the WEB cookie.
Okay to get the cryption of the password seems not too hard.

Do I need to send the correct symbol or doesnt it matter if i send "????" there?
07/05/2013 17:23 Xave :)#4
Quote:
Originally Posted by Kardromidoon View Post
So the auth server is automaticly assigned by the WEB cookie.
Okay to get the cryption of the password seems not too hard.

Do I need to send the correct symbol or doesnt it matter if i send "????" there?
Im Sending Like this :
PHP Code:
   Packet Packet = new Packet();
                
Packet.setID(4352);
                
Packet.add("572334798");
                
Packet.add(0);
                
Packet.add(Username);
                
PPKey int.Parse(NPP.Split(new char[] { ':' })[3]);
                
Packet.add(PPKey);
                
Packet.add(Username);
                
Packet.add("????");
                
Packet.add(2);
                
Packet.add(0);
                
Packet.add(NPP);
                
LoginSocket.Send(Packet.getBytes(0xC3)); 
07/05/2013 18:06 Kardromidoon#5
Quote:
Originally Posted by Xave :) View Post
Im Sending Like this :
PHP Code:
   Packet Packet = new Packet();
                
Packet.setID(4352);
                
Packet.add("572334798");
                
Packet.add(0);
                
Packet.add(Username);
                
PPKey int.Parse(NPP.Split(new char[] { ':' })[3]);
                
Packet.add(PPKey);
                
Packet.add(Username);
                
Packet.add("????");
                
Packet.add(2);
                
Packet.add(0);
                
Packet.add(NPP);
                
LoginSocket.Send(Packet.getBytes(0xC3)); 
Okay, thank you very much. :)

You know something about the second part of my initial question?

Quote:
I can send data from the userlist by adressing a packet code like that:
"packet_userlist_code TIMESTAMP (1: Nickname, 2: Clan, 3: Levelrange) VALUE" (i think its that style?)

How and where do I get data returned now?