after sending packets ( WPE) disconect

11/27/2015 12:57 djamaec#1
so why i get disconect after 30 sec when send any packet ?
tried on few private servers
11/27/2015 13:53 Proxynear#2
Do you have a nice connection?
11/27/2015 21:47 djamaec#3
yeah dosnt matter what packet i send i get dc
is there any protection or idk ?
11/27/2015 21:51 guesswho-.-#4
you need to keep track of the packetnumber and packetsize, idk what you're tryin to do but header checks are very strict and you should keep them accurate. and packets are encrypted, if you dont use the right cryptkey the server wont even read the packet and after like 15 secs you'll get a timeout. WPE wont work.
11/28/2015 13:43 djamaec#5
i was trying
recording by wpe
droped 10 000 dills
i get only 1 WSASEND packets
then i just press play on the packet to send it back
then after 30 sec i get DC

or recored the WSA send packet that i level up
then i resend it and again dc
11/28/2015 15:44 guesswho-.-#6
All these things you're trying won't work. Packet encryption isn't static and this kinda hacks never worked and never will. Lol.

Furthermore, when you resend a recorded packet it will be ignored. I mentioned the header and if you don't modify it, the server will reject it. And the server logic isn't as stupid as you thin.
11/28/2015 16:12 freez00#7
When you change the TCP packet, intercept the packet, or intercept and change the packet it affects how the server receives them. If they aren't sent in the right sequence then the server will DC you. If you change the packet then the size of the packet itself is different than what is read in the header. If the size doesn't match what's in the header, then it will also DC you. TCP is a reliable protocol. You can do what you want with UDP as there are no checks done, but it is a lot more risky and easier to hack.