I've coded a tool to intercept and log the packets sent between the Cabal game client and server. This tool is targeted to Cabal EU and similar version clients, but will work on the older private servers too, excluding reliable packet analysis data.
This is not a cheating application, this application merely allows to collect info that can be used to create cheats, emulators, bots and more.
This tool hooks Winsock2 functions to intercept the packet traffic and is different from the packet sniffer created by Yamachi, which works as an external proxy application.
There are 2 different applications in this project, a logger and a viewer. The logger logs the traffic and writes it into a .cpm data file, which the viewer can read. This way you can easily open and analyze different saved sessions.
This application is written in MASM.
This application supports custom packet parser plugins, more of them further down.
If you have analyzed packets and their contents, post the research, makes my job much faster!
This application is able to work while nProtect GameGuard is running, so no worries about that.
Some antivirus software might flag the files in the package as malware, but they are completely clean. If you do not trust these files, don't tell me about it, just don't use them!
~Screenshots~
-Loader-
-Viewer-
~Packet parser plugin~
If you are interested in coding your own packet data parser, it's fully possible.
argOpcode = Packet opcode
argData = Address of packet data
argSize = Size of packet data (only data, excluding header)
argWriteBuffer = Address of buffer that should receive an ANSI text string
argID = Packet origin: ID_SERVER (0x1) or ID_CLIENT (0x2)
The exported functions must be in __stdcall calling convention, meaning that the function must pop its own arguments from the stack before return.
Notes!
1) GetPacketType must return a pointer to an ANSI text string!
2) ParsePacketData must write in the write buffer, if the parser doesn't have any data to write, it must at least write a terminating NULL character in the buffer! The return value does not matter.
3) Because of a bug in HexEdit.dll (which I am not the author of), it should be mapped at address 0x10000000, which means other modules should be mapped at other addresses. As HexEdit.dll is loaded after the parser I recommend using ImageBase 0x20000000+ for the parser.
~Credits~
- Helped a lot with understanding the Cabal packet system.
~Update History~
~2012-06-18~
+ Initial release
~2012-06-19~
+ Fixed a bug in ParsePacketData plugin export handler
~2012-08-23~
+ Bugfixes in many modules
~2012-08-27~
+ Hidden from nProtect GameGuard again
~2013-09-01~
+ Viewer: Re-coded partially, new GUI
+ Parser: Re-coded, supports only a few packets at the moment
DOWNLOAD -> PRESS THANKS!
DO NOT SUPPORT LEECHING!
noob question.
what is the uses/purpose of CabalPacketMonitor?
can it block the packet that can send on the server.? "make me invisible to their server, and free to use all kinds of hack?" cannot saved on their hack log?
I've coded a tool to intecept and log the packets sent between the Cabal gameclient and server. This tool is targeted to Cabal EU and similar version clients, but will work on the older private servers too.
FOR THE IDIOTS:
THIS IS NOT AN ANTICHEAT BYPASS!! THIS IS NOT A CHEAT EITHER!!
This tool hooks Winsock2 functions to intercept the packet traffic and is different from the packet sniffer created by Yamachi, which works as an external application.
There are 2 different applications in this project, a logger and a viewer. The logger logs the traffic and writes it into a .cpm data file, which the viewer can read. This way you can easily open and analyze different saved sessions.
This application is written in MASM.
This application supports custom packet parser plugins, more of them further down.
This application is able to work while GameGuard is running, so no worries about that.
Some antivirus software might flag the files in the package as malware, but they are completely clean. If you do not trust these files, don't tell me about it, just don't use them!
~Screenshots~
-Loader-
-Viewer-
-Detailed packet view-
~Packet parser plugin~
If you are interested in coding your own packet data parser, it's fully possible.
= UNDER CONSTRUCTION =
~Credits~
- Helped a lot with understanding of Cabal packet system
~Donations~
This tool is freeware and I don't have any intentions of making it commercial, but I'd be very grateful for any donations you can offer, as programming usually takes a lot of free time.
The viewer has a built in button to access PayPal donation page.
~Update History~
~18/06/2012~
+ Initial release (ver. 1.0.0.0)
tnx a lot dude i've been looking for it for so long!!!!!
CO Packet Monitor 07/31/2013 - CO2 Programming - 45 Replies Packet monitoring tool aimed at latest retail Conquer client, with features such as packet filtering and client-to-server packet sending.
Tips:
Double-clicking an item/packet will give you a detailed look on it in format, as well as show the text representation of it
Bottom editbox/button is for sending client-to-server packets
Right-click the item/packet list for more features
EO Packet Monitor 02/25/2012 - EO Exploits, Hacks, Tools & Macros - 3 Replies You can use this program to study and analyze packets (non-encrypted) on the latest EO client. It shouldn't need much explaining, if you don't know what this is about, then it's most likely not going to be of any use to you anyway.
For a more advanced filter, you can add/remove "opcodes" and choose to ignore those or only display those. An opcode is a packet type and it is always positioned after the first 2 bytes. It is 2 bytes in size. To give an example, 3EC looks to be the opcode for...
Packet Monitor Program - iSROBOT 04/21/2006 - Silkroad Online - 10 Replies Hello Guys..
does anyone know any program which can monitors the packets in/out an ip address?
I plan to capture all the packets in and out of the CHina server from my computer..
hopefully this program allow me to filter and edit the packets too :)
It should work like a windows packet editor.. but it seems WPE doesn't work on ISROBOT because the processors are all done by silk.dll