Hi everybody.
I need help to find the keys for the decryption of packets of CrazyTao.
In EUDemons C# servers those Keys are used:
And in Conquer Online they used:
So, both key combinations are the same for login on CO and EO...
Problem is with CrazyTao, with those keys, it won't decrypt the packets the right way..
Is there anybody around here, that would like to help me find out what TQ used for CrazyTao, and would like to explain to me how to get those keys?
If i got those keys, i can go on developing a C# server for CrazyTao ;-)!
Thanks in advance!
I need help to find the keys for the decryption of packets of CrazyTao.
In EUDemons C# servers those Keys are used:
Code:
private byte[] m_Key1 = {
0x9D, 0x90, 0x83, 0x8A, 0xD1, 0x8C, 0xE7, 0xF6, 0x25, 0x28, 0xEB, 0x82, 0x99, 0x64, 0x8F, 0x2E,
0x2D, 0x40, 0xD3, 0xFA, 0xE1, 0xBC, 0xB7, 0xE6, 0xB5, 0xD8, 0x3B, 0xF2, 0xA9, 0x94, 0x5F, 0x1E,
0xBD, 0xF0, 0x23, 0x6A, 0xF1, 0xEC, 0x87, 0xD6, 0x45, 0x88, 0x8B, 0x62, 0xB9, 0xC4, 0x2F, 0x0E,
0x4D, 0xA0, 0x73, 0xDA, 0x01, 0x1C, 0x57, 0xC6, 0xD5, 0x38, 0xDB, 0xD2, 0xC9, 0xF4, 0xFF, 0xFE,
0xDD, 0x50, 0xC3, 0x4A, 0x11, 0x4C, 0x27, 0xB6, 0x65, 0xE8, 0x2B, 0x42, 0xD9, 0x24, 0xCF, 0xEE,
0x6D, 0x00, 0x13, 0xBA, 0x21, 0x7C, 0xF7, 0xA6, 0xF5, 0x98, 0x7B, 0xB2, 0xE9, 0x54, 0x9F, 0xDE,
0xFD, 0xB0, 0x63, 0x2A, 0x31, 0xAC, 0xC7, 0x96, 0x85, 0x48, 0xCB, 0x22, 0xF9, 0x84, 0x6F, 0xCE,
0x8D, 0x60, 0xB3, 0x9A, 0x41, 0xDC, 0x97, 0x86, 0x15, 0xF8, 0x1B, 0x92, 0x09, 0xB4, 0x3F, 0xBE,
0x1D, 0x10, 0x03, 0x0A, 0x51, 0x0C, 0x67, 0x76, 0xA5, 0xA8, 0x6B, 0x02, 0x19, 0xE4, 0x0F, 0xAE,
0xAD, 0xC0, 0x53, 0x7A, 0x61, 0x3C, 0x37, 0x66, 0x35, 0x58, 0xBB, 0x72, 0x29, 0x14, 0xDF, 0x9E,
0x3D, 0x70, 0xA3, 0xEA, 0x71, 0x6C, 0x07, 0x56, 0xC5, 0x08, 0x0B, 0xE2, 0x39, 0x44, 0xAF, 0x8E,
0xCD, 0x20, 0xF3, 0x5A, 0x81, 0x9C, 0xD7, 0x46, 0x55, 0xB8, 0x5B, 0x52, 0x49, 0x74, 0x7F, 0x7E,
0x5D, 0xD0, 0x43, 0xCA, 0x91, 0xCC, 0xA7, 0x36, 0xE5, 0x68, 0xAB, 0xC2, 0x59, 0xA4, 0x4F, 0x6E,
0xED, 0x80, 0x93, 0x3A, 0xA1, 0xFC, 0x77, 0x26, 0x75, 0x18, 0xFB, 0x32, 0x69, 0xD4, 0x1F, 0x5E,
0x7D, 0x30, 0xE3, 0xAA, 0xB1, 0x2C, 0x47, 0x16, 0x05, 0xC8, 0x4B, 0xA2, 0x79, 0x04, 0xEF, 0x4E,
0x0D, 0xE0, 0x33, 0x1A, 0xC1, 0x5C, 0x17, 0x06, 0x95, 0x78, 0x9B, 0x12, 0x89, 0x34, 0xBF, 0x3E};
private byte[] m_Key2 = {
0x62, 0x4F, 0xE8, 0x15, 0xDE, 0xEB, 0x04, 0x91, 0x1A, 0xC7, 0xE0, 0x4D, 0x16, 0xE3, 0x7C, 0x49,
0xD2, 0x3F, 0xD8, 0x85, 0x4E, 0xDB, 0xF4, 0x01, 0x8A, 0xB7, 0xD0, 0xBD, 0x86, 0xD3, 0x6C, 0xB9,
0x42, 0x2F, 0xC8, 0xF5, 0xBE, 0xCB, 0xE4, 0x71, 0xFA, 0xA7, 0xC0, 0x2D, 0xF6, 0xC3, 0x5C, 0x29,
0xB2, 0x1F, 0xB8, 0x65, 0x2E, 0xBB, 0xD4, 0xE1, 0x6A, 0x97, 0xB0, 0x9D, 0x66, 0xB3, 0x4C, 0x99,
0x22, 0x0F, 0xA8, 0xD5, 0x9E, 0xAB, 0xC4, 0x51, 0xDA, 0x87, 0xA0, 0x0D, 0xD6, 0xA3, 0x3C, 0x09,
0x92, 0xFF, 0x98, 0x45, 0x0E, 0x9B, 0xB4, 0xC1, 0x4A, 0x77, 0x90, 0x7D, 0x46, 0x93, 0x2C, 0x79,
0x02, 0xEF, 0x88, 0xB5, 0x7E, 0x8B, 0xA4, 0x31, 0xBA, 0x67, 0x80, 0xED, 0xB6, 0x83, 0x1C, 0xE9,
0x72, 0xDF, 0x78, 0x25, 0xEE, 0x7B, 0x94, 0xA1, 0x2A, 0x57, 0x70, 0x5D, 0x26, 0x73, 0x0C, 0x59,
0xE2, 0xCF, 0x68, 0x95, 0x5E, 0x6B, 0x84, 0x11, 0x9A, 0x47, 0x60, 0xCD, 0x96, 0x63, 0xFC, 0xC9,
0x52, 0xBF, 0x58, 0x05, 0xCE, 0x5B, 0x74, 0x81, 0x0A, 0x37, 0x50, 0x3D, 0x06, 0x53, 0xEC, 0x39,
0xC2, 0xAF, 0x48, 0x75, 0x3E, 0x4B, 0x64, 0xF1, 0x7A, 0x27, 0x40, 0xAD, 0x76, 0x43, 0xDC, 0xA9,
0x32, 0x9F, 0x38, 0xE5, 0xAE, 0x3B, 0x54, 0x61, 0xEA, 0x17, 0x30, 0x1D, 0xE6, 0x33, 0xCC, 0x19,
0xA2, 0x8F, 0x28, 0x55, 0x1E, 0x2B, 0x44, 0xD1, 0x5A, 0x07, 0x20, 0x8D, 0x56, 0x23, 0xBC, 0x89,
0x12, 0x7F, 0x18, 0xC5, 0x8E, 0x1B, 0x34, 0x41, 0xCA, 0xF7, 0x10, 0xFD, 0xC6, 0x13, 0xAC, 0xF9,
0x82, 0x6F, 0x08, 0x35, 0xFE, 0x0B, 0x24, 0xB1, 0x3A, 0xE7, 0x00, 0x6D, 0x36, 0x03, 0x9C, 0x69,
0xF2, 0x5F, 0xF8, 0xA5, 0x6E, 0xFB, 0x14, 0x21, 0xAA, 0xD7, 0xF0, 0xDD, 0xA6, 0xF3, 0x8C, 0xD9};
Code:
Key1 = 9D 90 83 8A D1 8C E7 F6 25 28 EB 82 99 64 8F 2E 2D 40 D3 FA E1 BC B7 E6 B5 D8 3B F2 A9 94 5F 1E BD F0 23 6A F1 EC 87 D6 45 88 8B 62 B9 C4 2F 0E 4D A0 73 DA 01 1C 57 C6 D5 38 DB D2 C9 F4 FF FE DD 50 C3 4A 11 4C 27 B6 65 E8 2B 42 D9 24 CF EE 6D 00 13 BA 21 7C F7 A6 F5 98 7B B2 E9 54 9F DE FD B0 63 2A 31 AC C7 96 85 48 CB 22 F9 84 6F CE 8D 60 B3 9A 41 DC 97 86 15 F8 1B 92 09 B4 3F BE 1D 10 03 0A 51 0C 67 76 A5 A8 6B 02 19 E4 0F AE AD C0 53 7A 61 3C 37 66 35 58 BB 72 29 14 DF 9E 3D 70 A3 EA 71 6C 07 56 C5 08 0B E2 39 44 AF 8E CD 20 F3 5A 81 9C D7 46 55 B8 5B 52 49 74 7F 7E 5D D0 43 CA 91 CC A7 36 E5 68 AB C2 59 A4 4F 6E ED 80 93 3A A1 FC 77 26 75 18 FB 32 69 D4 1F 5E 7D 30 E3 AA B1 2C 47 16 05 C8 4B A2 79 04 EF 4E 0D E0 33 1A C1 5C 17 06 95 78 9B 12 89 34 BF 3E Key 2= 62 4F E8 15 DE EB 04 91 1A C7 E0 4D 16 E3 7C 49 D2 3F D8 85 4E DB F4 01 8A B7 D0 BD 86 D3 6C B9 42 2F C8 F5 BE CB E4 71 FA A7 C0 2D F6 C3 5C 29 B2 1F B8 65 2E BB D4 E1 6A 97 B0 9D 66 B3 4C 99 22 0F A8 D5 9E AB C4 51 DA 87 A0 0D D6 A3 3C 09 92 FF 98 45 0E 9B B4 C1 4A 77 90 7D 46 93 2C 79 02 EF 88 B5 7E 8B A4 31 BA 67 80 ED B6 83 1C E9 72 DF 78 25 EE 7B 94 A1 2A 57 70 5D 26 73 0C 59 E2 CF 68 95 5E 6B 84 11 9A 47 60 CD 96 63 FC C9 52 BF 58 05 CE 5B 74 81 0A 37 50 3D 06 53 EC 39 C2 AF 48 75 3E 4B 64 F1 7A 27 40 AD 76 43 DC A9 32 9F 38 E5 AE 3B 54 61 EA 17 30 1D E6 33 CC 19 A2 8F 28 55 1E 2B 44 D1 5A 07 20 8D 56 23 BC 89 12 7F 18 C5 8E 1B 34 41 CA F7 10 FD C6 13 AC F9 82 6F 08 35 FE 0B 24 B1 3A E7 00 6D 36 03 9C 69 F2 5F F8 A5 6E FB 14 21 AA D7 F0 DD A6 F3 8C D9 Its used the same, so with the comma's and 0x in front of every HEX token.
Problem is with CrazyTao, with those keys, it won't decrypt the packets the right way..
Is there anybody around here, that would like to help me find out what TQ used for CrazyTao, and would like to explain to me how to get those keys?
If i got those keys, i can go on developing a C# server for CrazyTao ;-)!
Thanks in advance!