This tool can be used to dump the key from Binary servers 5095/5065 (Maybe other versions too but not tested)
The tool will give you all the information you need to create a unprotected exe for the desired server.
Requirements
Please make sure you have .net framework 4.0 installed on your computer
Compatibilty: XP,Vista,Windows7,Windows 8. (32 and 64bit)
Instructions
Step1. Extract The RaR File
Step2. Run ConquerBlowfishDumper.exe
Step3. Launch the target client.
Step4. Login Normally with the target client.
Step5. You will recieve a message box.. warning you that you will be disconnected.. (Press OK)
Step6. Login Again..
Step7. You now have the blowfish keys.. etc etc.
Screenshot
Some Servers I have already dumped
Fallen-Co
Code:
----------- Key Dump Log ------- Target: Fallen-Co.Bin Blowfish (Ascii): fF2DK2LA;A;XWKWSDS2a?6M Blowfish (Hex): 66-46-32-44-4B-32-4C-41-3B-41-3B-58-57-4B-57-53-44-53-32-61-E5-36-4D Server Prefix (Ascii): yname Server Prefix (Hex): 79-6E-61-6D-65-00-00-00 Client Prefix (Ascii): mismatch Client Prefix (Hex): 6D-69-73-6D-61-74-63-68 ------- Decryption Proof ------ Server Public Key:A5788BEEEC90BCB03AA01067E20DFBF593306BD9684580228F80982D27812D341F6AF1603465E4DF3837D307DC4A13048A5DCB0B4D9DCFED40D197B7E41A304F Server P:C87E3BD3B770698EFC62DFD3EA5D80814E07301A564B2271410A349574866DC69EE44E523E85BA371CC5772C97B202B519638962E2EF8CAB127F866929845B43 Server G:05 Client Public Key:A5788BEEEC90BCB03AA01067E20DFBF593306BD9684580228F80982D27812D341F6AF1603465E4DF3837D307DC4A13048A5DCB0B4D9DCFED40D197B7E41A304F ------- Key Dumper By Ultimation ------
Code:
----------- Key Dump Log ------- Target: Devils-Co.exe Blowfish (Ascii): rectoryAssssssss Blowfish (Hex): 72-65-63-74-6F-72-79-41-73-73-73-73-73-73-73-73 Server Prefix (Ascii): ess32Nex Server Prefix (Hex): 65-73-73-33-32-4E-65-78 Client Prefix (Ascii): ignature Client Prefix (Hex): 69-67-6E-61-74-75-72-65 ------- Decryption Proof ------ Server Public Key:762CDF774ADA6B5F810ED66B0ADE791EC669D8F591807F2A2EE67F53E0EEE5DEA20669F8B8F316522BE66A54D0C96DD7424B2D938BD6CCB394A9E6D23A5100DA Server P:C87E3BD3B770698EFC62DFD3EA5D80814E07301A564B2271410A349574866DC69EE44E523E85BA371CC5772C97B202B519638962E2EF8CAB127F866929845B43 Server G:05 Client Public Key:762CDF774ADA6B5F810ED66B0ADE791EC669D8F591807F2A2EE67F53E0EEE5DEA20669F8B8F316522BE66A54D0C96DD7424B2D938BD6CCB394A9E6D23A5100DA ------- Key Dumper By Ultimation ------
Code:
----------- Key Dump Log ------- Target: ShadowCo.exe Blowfish (Ascii): h3`ajske(r?7&;5i Blowfish (Hex): 68-33-60-61-6A-73-6B-65-28-72-D5-37-26-3B-35-69 Server Prefix (Ascii): N4jWzxB? Server Prefix (Hex): 4E-34-6A-57-7A-78-42-D5 Client Prefix (Ascii): Y4wxLd0? Client Prefix (Hex): 59-34-77-78-4C-64-30-D5 ------- Decryption Proof ------ Server Public Key:1F46A89938DC49AD7325EC469DE4828D6EAC65FD3FDF9F6A9332DE03AFD8B4EAE9D0F634DC7F16243B444C3C3C5E36C96A34C91415F6A2C1F53965B304D9CB31 Server P:C87E3BD3B770698EFC62DFD3EA5D80814E07301A564B2271410A349574866DC69EE44E523E85BA371CC5772C97B202B519638962E2EF8CAB127F866929845B43 Server G:05 Client Public Key:1F46A89938DC49AD7325EC469DE4828D6EAC65FD3FDF9F6A9332DE03AFD8B4EAE9D0F634DC7F16243B444C3C3C5E36C96A34C91415F6A2C1F53965B304D9CB31 ------- Key Dumper By Ultimation ------
Code:
----------- Key Dump Log ------- Target: pinoy-co.exe Blowfish (Ascii): Kl125qUeika48z12 Blowfish (Hex): 4B-6C-31-32-35-71-55-65-69-6B-61-34-38-7A-31-32 Server Prefix (Ascii): TQServer Server Prefix (Hex): 54-51-53-65-72-76-65-72 Client Prefix (Ascii): TQClient Client Prefix (Hex): 54-51-43-6C-69-65-6E-74 ------- Decryption Proof ------ Server Public Key:A1C846E2796187B1130E564D009DC84B2E2AC09CECC55260198C022097AB0346EFD27584BCECC6F07B8B4273E3336CE3599798EF17D77DDF4162E5B0E15F6DB6 Server P:C87E3BD3B770698EFC62DFD3EA5D80814E07301A564B2271410A349574866DC69EE44E523E85BA371CC5772C97B202B519638962E2EF8CAB127F866929845B43 Server G:05 Client Public Key:A1C846E2796187B1130E564D009DC84B2E2AC09CECC55260198C022097AB0346EFD27584BCECC6F07B8B4273E3336CE3599798EF17D77DDF4162E5B0E15F6DB6 ------- Key Dumper By Ultimation ------
On a final note:







