|
You last visited: Today at 03:43
Advertisement
Decrypted server.dat patch.
Discussion on Decrypted server.dat patch. within the CO2 Exploits, Hacks & Tools forum part of the Conquer Online 2 category.
12/08/2008, 08:10
|
#1
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
Decrypted server.dat patch.
This is a patch for conquer.exe that loads a decrypted server.dat.
It might have a few problems, made this quickly (shouldn't though).
Download

Features
-Loads decrypted server.data
-Bypasses play.exe
-antivirus disabled
-Patched local check.
Contains
-Conquer.exe (patched)
-Server.dat (decrypted)
Note!: The Server.dat was updated so old ones will not work. Server.dat now uses xml.
You may add onto this or apply these patches to your own client if you give credit. Pm me if you need the exact patches.
|
|
|
12/08/2008, 17:27
|
#2
|
elite*gold: 0
Join Date: Jun 2006
Posts: 71
Received Thanks: 4
|
Yeah ty ... BUT when i change some ip in it - it says cant open server dat ....
|
|
|
12/08/2008, 17:59
|
#3
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
there is probably a check, I will look at it in a bit.
|
|
|
12/08/2008, 18:06
|
#4
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
It loads fine for me, what are you changing?
Edit: Ah, it is when you connect, give me a minute to remove the check.
|
|
|
12/08/2008, 18:12
|
#5
|
elite*gold: 0
Join Date: Jun 2006
Posts: 71
Received Thanks: 4
|
i made few tests - it check is the ip is local - if it is - error
|
|
|
12/08/2008, 18:17
|
#6
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
fixed it, give me 5 minutes to upload.
|
|
|
12/08/2008, 18:37
|
#7
|
elite*gold: 0
Join Date: Jun 2006
Posts: 71
Received Thanks: 4
|
still not working ... sry - local check passed ... BUT it trys to connect and exits ...
|
|
|
12/08/2008, 18:37
|
#8
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
Nice work. I was considering doing this myself, but wasn't sure it'd be worth the time and effort, with the frequency TQ are pushing out patches, I wouldn't wanna spent more than 5 minutes updating it for future versions.
Not looked into how you did it, but if you share the method it'll be handy (rather than me doing a binary comparison), then we could perhaps come up with some heuristic to get the job done quickly. My idea was just to replace calls to the libeay32 RSA_public_decrypt() and zlib inflate() with functions that take equivalent arguments but just copy over the already-decrypted buffer. I also had a go at actually implementing the decryption and inflation in a stand alone app, so that the decrypted server.dat doesn't need to be pulled from memory every new patch. openssl tests my patience too much though.
|
|
|
12/08/2008, 18:44
|
#9
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
I dislike using external projects XD. Such a pain in the *** to get configured.
|
|
|
12/08/2008, 19:17
|
#10
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
I didn't think it'd be much of a problem. I already have openssl and zlib built & configured, and I know exactly which functions match up to which in the conquer.exe. I completely cloned the arguments for RSA_public_decrypt() and passed them to my own, but the think always returns -1, a problem with BN_mod_exp_mont I believe. (TQ using some oddly modified version of openssl?)
Anyway, I gave up, it's probably a waste of time anyway since re-encrypting it would be more awkward than any of that.
Had a quick look at your patch. It does seem pretty simple, mostly just explicit jumps and nops where required. I'm not too sure it's the safest of methods, because you might end up jmping over, or noping a call to some code responsable for memory alloc/dealloc, the problems that could arise then are unpredectable. Seems to work anyway, so I can't complain about it yet. Still, how long do you think it'll take you to repeat the process next time a patch comes out? Think it'll be worth the continued effort to maintain?
|
|
|
12/08/2008, 19:27
|
#11
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
Didn't take long. And I don't believe I nopped any deallocing functions. I nopped the decrypt function and the inflate function.
|
|
|
12/08/2008, 19:52
|
#12
|
elite*gold: 0
Join Date: Jun 2006
Posts: 71
Received Thanks: 4
|
Maby noping not so good - ur exe passes the login to proxy and exits before receiving the answer - else same proxy works with old exe (before last 2 pach)
|
|
|
12/08/2008, 20:00
|
#13
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
Don't really get what you mean.
|
|
|
12/08/2008, 20:40
|
#14
|
elite*gold: 0
Join Date: Jun 2006
Posts: 71
Received Thanks: 4
|
Change some server ip to 127.0.0.1 - ant login in game by proxy or routing - ull se its impossible couse exe - exits before initializing .... look at communication - ull see - packets to server - then exe exits - not waiting answer
|
|
|
12/08/2008, 20:42
|
#15
|
elite*gold: 0
Join Date: Jun 2006
Posts: 965
Received Thanks: 576
|
Well I don't have a proxy so I cannot fix.
|
|
|
 |
|
Similar Threads
|
[Request] 5101 decrypted Server.dat and .EXE
09/10/2009 - CO2 Private Server - 1 Replies
Yeah, I know a few of you had 5101 servers. If you don't mind just share your (conquer).exe and server.dat.
|
Loads decrypted server.dat tutorials
03/19/2009 - CO2 Programming - 9 Replies
1. Close all Conquer windows
2. Start "OllyDBG" press File -> Open
3. Open Conquer.exe
4. Let it load
5. Press the E icon in linen
http://img247.imageshack.us/img247/5294/start5rv6 .th.jpg
6. Double-click on the name of "Conquer"
http://img166.imageshack.us/img166/3657/start6kf0 .th.jpg
7. Right click on the CPU - Window -> Analysis -> Analysis code
http://img166.imageshack.us/img166/4885/start7qz9 .th.jpg
|
decrypted mapdestination.dat
01/18/2008 - Eudemons Online - 8 Replies
Hello all. I have decrypted mapdestination.dat, however, I cannot find the coordinates, only texts are clearly visible.
the file is encrypted this way: if you ignore first 4 bytes, group of 532 bytes is xor-ed with first byte of encryption key, next 532 bytes are xor-ed with second byte of key.. etc..
structure of the decrypted file is unknown to me, maybe someone will be lucky.
no clear coordinates can be seen..
here is the encryption key for decrypting the file:
byte enc_key = new...
|
All times are GMT +1. The time now is 03:44.
|
|