Oriental Kalonline PK Password

05/26/2020 01:39 HighGamer.#1
PK Password: Or$k@A9lYx4jk
07/20/2024 09:56 ho29#2
where is config.pk ?
07/20/2024 21:31 HighGamer.#3
data\Config folder
07/21/2024 07:36 ho29#4
HighGamer. can i got ur help please want to know what's pk pw of this engine because i tryed alot and cant found it .
here we go ; [Only registered and activated users can see links. Click Here To Register...]
07/22/2024 09:51 ho29#5
@[Only registered and activated users can see links. Click Here To Register...]
07/22/2024 19:13 HighGamer.#6
password to this engine.exe is
EV)O8@BL$3O2E

but if it uses Engine.dll (private server) they change the password before engine.exe loads. I can get this password but you need to attach your engine.dll
07/23/2024 08:01 ho29#7
i want pw for config.pk, [Private] so, we cant get it ?

no way to get pk pw of this config? @[Only registered and activated users can see links. Click Here To Register...]
07/23/2024 20:37 HighGamer.#8
Quote:
Originally Posted by ho29 View Post
i want pw for config.pk, [Private] so, we cant get it ?

no way to get pk pw of this config? @[Only registered and activated users can see links. Click Here To Register...]
very hard but still possible, requires brute forcing the password using the PKZIP keys.
07/24/2024 10:21 ho29#9
i dun know what's pkzip keys xD , but i want you help me to get this pk unpacked please

here is ; [Only registered and activated users can see links. Click Here To Register...]
07/24/2024 19:30 Lungi#10
no1 will do smth like that for free, bozo
07/26/2024 02:04 HighGamer.#11
Quote:
Originally Posted by ho29 View Post
i dun know what's pkzip keys xD , but i want you help me to get this pk unpacked please

here is ; [Only registered and activated users can see links. Click Here To Register...]
to unpack config.pk the config.pk won't help you also need PK Keys you get them from engine.dll from HyperServerNetwork

you need this tool
[Only registered and activated users can see links. Click Here To Register...]

it finds password in 1 hour for any private server for kalonline, you need to specify a dat file encoded to it so it will decode it based on the encoded result.

command line
Code:
 zipdecrypt key0 key1 key2 encrypted_archive decrypted_archive
specify the key0 key1 key2 to decode your config.pk

it doesnt come with zipencrypt you have to make this tool yourself to re-package the config.pk

to recompress the pkzip with the original keys you need this software
[Only registered and activated users can see links. Click Here To Register...]

Code:
Recover password
Given the internal keys, bkcrack can try to find the original password. You can look for a password up to a given length using a given character set:

bkcrack -k 1ded830c 24454157 7213b8c5 -r 10 ?p
You can be more specific by specifying a minimal password length:

bkcrack -k 18f285c6 881f2169 b35d661d -r 11..13 ?p
specify the password length with -r flag and it will brute force it in 1 hour.

like so

Code:
bkcrack -k 18996980 070e64a5 38e61fb0 -r 8 \?a
bkcrack 1.3.5 - 2022-03-20
[16:16:01] Recovering password
length 0-6...
length 7...
length 8...
[16:16:01] Password
as bytes: 6d 6f 72 70 68 65 75 73
as text: morpheus
07/26/2024 07:56 ho29#12
@[Only registered and activated users can see links. Click Here To Register...] i just was want config.pk to get marco.dat this just all i want.
07/26/2024 18:51 HighGamer.#13
Quote:
Originally Posted by ho29 View Post
@[Only registered and activated users can see links. Click Here To Register...] i just was want config.pk to get marco.dat this just all i want.
like i said config.pk is useless without engine.dll

in engine.exe search for string "1.2.3" this will be where pk password is decoded.

Here is results for [Only registered and activated users can see links. Click Here To Register...]

I decrypted their config.pk

Find the keys in engine.dll
They will look in raw memory dump like this

Code:
66 D1 87 8F   
36 AB 3A 7A  
E1 77 59 A5
flip them like so

Code:
8f87d166 7a3aab36 a55977e1
Results:
Code:
C:\Users\USER>"C:\pkcrack\bin\zipdecrypt.exe" 8f87d166 7a3aab36 a55977e1 "C:\Users\USER\Desktop\KalOnline-X Update 7-12-2024\data\Config\config.pk.zip" "C:\Users\USER\Desktop\KalOnline-X Update 7-12-2024\data\Config\test.zip"
Decrypting BattleRidingBoosterData.dat (ed01139126e0861f9910c3d7)... OK!
Decrypting cashitemdb.dat (ed01139126e0861f9910c359)... OK!
Decrypting cashitemdb2.dat (ed01139126e0861f9910c3f2)... OK!
Decrypting chiwoomirror.dat (ed01139126e0861f9910c39e)... OK!
Decrypting ClientVer.dat (ed01139126e0861f9910c3a3)... OK!
Decrypting configlist.txt (ed01139126e0861f9910c387)... OK!
Decrypting CostumeRankupData.dat (ed01139126e0861f9910c3a6)... OK!
Decrypting CostumeSetOptionData.dat (ed01139126e0861f9910c3db)... OK!
Decrypting CostumeUpgradeItem.dat (ed01139126e0861f9910c34b)... OK!
Decrypting crc.dat (ed01139126e0861f9910c367)... OK!
Decrypting CreateMonsterPet.dat (a5350ec55efe7dd70b965e25)... OK!
Decrypting Dic.dat (a5350ec55efe7dd70b965e34)... OK!
Decrypting Dic_Change.dat (a5350ec55efe7dd70b965e10)... OK!
Decrypting Discord.dat (a5350ec55efe7dd70b965e70)... OK!
Decrypting Ditto.dat (a5350ec55efe7dd70b965e18)... OK!
Decrypting event.dat (a5350ec55efe7dd70b965ee8)... OK!
Decrypting EventScript.dat (a5350ec55efe7dd70b965e14)... OK!
Decrypting EXPTable.dat (a5350ec55efe7dd70b965e48)... OK!
Decrypting GenMonster.dat (32a7c9e5b1fa75c396b36048)... OK!
Decrypting guidebook.dat (eadbc518e8186c7b0839fc68)... OK!
Decrypting GuildRaidInfo.dat (eadbc518e8186c7b0839fcb5)... OK!
Decrypting Hotkey.dat (eadbc518e8186c7b0839fc5b)... OK!
Decrypting InitDestroyItem.dat (eadbc518e8186c7b0839fcf4)... OK!
Decrypting InitEvent.dat (eadbc518e8186c7b0839fcc6)... OK!
Decrypting InitEventDesc.dat (eadbc518e8186c7b0839fce5)... OK!
Decrypting InitGradeTable.dat (eadbc518e8186c7b0839fc40)... OK!
Decrypting InitItem.dat (eadbc518e8186c7b0839fc94)... OK!
Decrypting initNPC.dat (2f827b6c73325b2005dc9abf)... OK!
Decrypting InitOrnamentBuff.dat (e8b6769fab5052d877623640)... OK!
Decrypting InitSwapDragonBall.dat (e8b6769fab5052d87762365c)... OK!
Decrypting InitSwapHighWearItems.dat (e8b6769fab5052d87762360f)... OK!
Decrypting InitSwapOrnament.dat (e8b6769fab5052d877623623)... OK!
Decrypting ItemChange.dat (e8b6769fab5052d877623632)... OK!
Decrypting JewelUse.dat (e8b6769fab5052d877623690)... OK!
Decrypting jobsystem.dat (e8b6769fab5052d87762368b)... OK!
Decrypting KGameSystem.dat (a0eb72d3e26e4990e9e8d2d4)... OK!
Decrypting KillingFieldData.dat (a0eb72d3e26e4990e9e8d227)... OK!
Decrypting macro.dat (a0eb72d3e26e4990e9e8d284)... OK!
Decrypting Magong.dat (e59128266d883834e68c6f58)... OK!
Decrypting MasterEnchant.dat (e59128266d883834e68c6f27)... OK!
Decrypting md5.dat (e59128266d883834e68c6f59)... OK!
Decrypting message.dat (e59128266d883834e68c6f90)... OK!
Decrypting namefilter.dat (70dd96ce83bc167ddfd2ab73)... OK!
Decrypting NamePadColor.dat (70dd96ce83bc167ddfd2ab71)... OK!
Decrypting object.dat (70dd96ce83bc167ddfd2ab76)... OK!
Decrypting pathinfo.dat (28129101bada0d35515847b0)... OK!
Decrypting pkzipc.exe (6b93f9dc072ce237bd251ebd)... OK!
Decrypting Prefix.dat (b039b02f9246d1dbbac9bcdd)... OK!
Decrypting Quest.dat (b039b02f9246d1dbbac9bc4d)... OK!
Decrypting RentalEquipment.dat (b039b02f9246d1dbbac9bcd3)... OK!
Decrypting RideItemRankupData.dat (686eab63ca64c8932c4e58db)... OK!
Decrypting RideItemUpgradeData.dat (686eab63ca64c8932c4e589e)... OK!
Decrypting RidingCollection.dat (686eab63ca64c8932c4e58e5)... OK!
Decrypting script.dat (686eab63ca64c8932c4e58e5)... OK!
Decrypting sound.dat (686eab63ca64c8932c4e58b4)... OK!
Decrypting swapItem.dat (686eab63ca64c8932c4e58c5)... OK!
Decrypting switchmodel.dat (686eab63ca64c8932c4e58bf)... OK!
Decrypting task.dat (686eab63ca64c8932c4e58cd)... OK!
Decrypting taskquest.dat (21a2a6960182bf4b9ed4f4aa)... OK!
Decrypting tipsystem.dat (21a2a6960182bf4b9ed4f464)... OK!
Decrypting TrainingCenter.dat (ad1462b6557eb73829f2f633)... OK!
Decrypting xlate.dat (ad1462b6557eb73829f2f60e)... OK!
After one 25 minutes of brute forcing.

Code:
Microsoft Windows [Version 10.0.17763.6054]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Users\USER>"D:\Users\Roman\Tools\PKZIP Cracker\bkcrack.exe" -k 8f87d166 7a3aab36 a55977e1 -r 16 ?p
bkcrack 1.7.0 - 2024-05-26
[13:44:17] Recovering password
length 0-6...
length 7...
length 8...
length 9...
length 10...
length 11...
length 12...
length 13...
Password: SH&Xe@A%AH$#D
54.1 % (4885 / 9025)
Found a solution. Stopping.
You may resume the password recovery with the option: --continue-recovery 53482722202020
[14:38:01] Password
as bytes: 53 48 26 58 65 40 41 25 41 48 24 23 44
as text: SH&Xe@A%AH$#D
Code:
Password decrypted as SH&Xe@A%AH$#D

screenshot:
[Only registered and activated users can see links. Click Here To Register...]

[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
07/27/2024 07:56 ho29#14
here is engine.dll my love <3 xD
[Only registered and activated users can see links. Click Here To Register...]
@[Only registered and activated users can see links. Click Here To Register...] i sent engine.dll here , because cant send to you any message your inv is full
07/27/2024 20:57 HighGamer.#15
Quote:
Originally Posted by ho29 View Post
here is engine.dll my love <3 xD
[Only registered and activated users can see links. Click Here To Register...]
@[Only registered and activated users can see links. Click Here To Register...] i sent engine.dll here , because cant send to you any message your inv is full
Code:
Dev KalOnline / Ocean Kalonline config.pk Password: V2*nr$5sOoO!0
my messages inv is full because you spammed it lol.. anyways i charge 10$ for this btw.