Hello ppl, so ive been learning general hacking methods for quite a decent while now, first i started out with small things such as memory hacks and then i started learning even more which led me to packet sniffing and that led me to the idea of fiddling around with conquer. Now that ive had a chance to play around with it i decided to hook the connect function of the game and i was successful at doing so, i also managed to get the client to connect to my socket first rather than connect to the TQ server and now that ive done so i kind of have my own little proxy kinda haha, a man in the middle, but now im stuck the packets that r going through r encrypted and i would like to know how i can decrypt them and is it necessary that i learn to use a debugger such as olly?
Hello ppl, so ive been learning general hacking methods for quite a decent while now, first i started out with small things such as memory hacks and then i started learning even more which led me to packet sniffing and that led me to the idea of fiddling around with conquer. Now that ive had a chance to play around with it i decided to hook the connect function of the game and i was successful at doing so, i also managed to get the client to connect to my socket first rather than connect to the TQ server and now that ive done so i kind of have my own little proxy kinda haha, a man in the middle, but now im stuck the packets that r going through r encrypted and i would like to know how i can decrypt them and is it necessary that i learn to use a debugger such as olly?
Thanks,
Konsowa
Can you not hook the packet sniffer to before the packet gets encrypted?
Oh ok ill try hooking them and ill see how things go from there ill tell u how I did when I get home coz now I'm at skool.
Thank you for the help!
Okay so i hooked the send and recv methods. So now i have the send function
int recv(
__in SOCKET s,
__out char *buf,
__in int len,
__in int flags
);
so what i understood from ur post is that what ever is in buf is not encrypted and that i shud be using the data inside buf and its encrypted in the send method. Please correct me if im wrong. If i was rite then how can i pass these packets to the proxy??
Thanks bro it works now but im still a bit confused in terms of the packets are they really decrypted when i get them in my hooked recv?
If you hook recv function in ws2_32.dll, the packets are definitely not decrypted. You'd have to hook somewhere inside Conquer.exe after the packet has been decrypted.
You could look at my samples in the ".NET hooking library take two" thread to see how I do it if you need that
Free Stanford Cryptography course 03/07/2012 - CO2 Programming - 6 Replies Hey just in case anyone is interested, Stanford has a free online course that starts to today on cryptography. They also have other ones on computer science, game design, algorithm design, etc coming out soon.
Course: https://www.coursera.org/crypto/auth/welcome
[Release]5017 Password Cryptography 06/22/2011 - CO2 PServer Guides & Releases - 10 Replies -5017+
Will work with Lower Versions but not all
Will work with Higher versions but not all
Create a new .cs file if you wish and paste this class:
Password Cryptography 03/03/2011 - CO2 Private Server - 13 Replies #Problem solved
Thank You everybody, I Appreciate this.
Client Server Cryptography? 07/14/2009 - Archlord - 7 Replies i was wondering, the communication between alefcient and the game server is encrypted, and alefclient binary seems to use Cryptography API (CNG) with most of its functions like:
BCryptCloseAlgorithmProvider
BCryptCreateHash
BCryptDecrypt
BCryptDeriveKey
BCryptDestroyHash
BCryptDestroyKey
BCryptDestroySecret
BCryptDuplicateHash