Quote:
Originally Posted by drixnak
So I was able to use wireshark to capture packets and then I attempted to retransmit them after identifying which packets were being used. It appears that they're using SSL, but I'm not 100% sure. Anyway, resending the packets failed and gave me a TCP error message from their server. I tried editing the identification numbers on the packets and predict the next sequence numbers and stuff, but no go. Anyone know what they're using to identify a resent packet?
|
They "crypted" so you first need to decrypt the packets before you actual change anything.
And the "decrypt" part is kinda messy.
In the past i started like this:
Send "1" in the chat => read package.
Send "2" in the chat => read package.
Send "3" in the chat => read package.
.......
This way you can see what is different in the package, you can also send the same and just see what part is the actual ID of the package.
With enough packages you "can" decrypt the code, but its still messy.