Does anybody have the new login packet structure for client 5089+? For example, if I use an older client and send the following login information using the CO client:
username : test
password : test
I receive the following encrypted packet (packet length is 52 bytes):
0x17 0x84 0x04 0x65 0xD7 0x13 0xC4 0xA5
0xDF 0x0F 0x33 0xA5 0x14 0xCB 0x75 0x6F
0x5F 0x89 0xB0 0x22 0xD5 0x64 0x7A 0x36
0x5E 0x77 0x1B 0xA7 0xC7 0xAE 0xF8 0xB8
0x69 0xF4 0x01 0x1C 0xA6 0x55 0xF2 0xC7
0x4F 0x33 0xC3 0x8C 0xF0 0xC1 0x7F 0x6D
0x59 0x87 0xBA 0x20
I can decrypt the packet and then get the username of "test" just fine.
However, when doing the same thing with the new CO client (i'm using 5089) I receive the following packet (packet length is 276 bytes):
0x15 0x94 0x56 0x65 0xD7 0x13 0xC4 0xA5
0xDF 0x0F 0x33 0xA5 0x14 0xCB 0x75 0x6F
0x5F 0x89 0xB0 0x22 0x93 0x46 0xF6 0xE3
0xD6 0x00 0x3E 0xA2 0x17 0xC4 0x78 0x6C
0x56 0x82 0xBF 0x2B 0x92 0x43 0xF5 0xE0
0xD9 0x05 0x35 0xAB 0x16 0xC1 0x7F 0x6D
0x59 0x87 0xBA 0x20 0x9D 0x4C 0xF8 0xE1
0xD0 0x0E 0x30 0xA0 0x11 0xC2 0x72 0x62
0x50 0x88 0xB1 0x29 0x9C 0x49 0xFF 0xE6
0xDB 0x03 0x3F 0xA9 0x10 0xCF 0x71 0x63
0x5B 0x8D 0xBC 0x26 0x9F 0x4A 0xF2 0xE7
0xD2 0x04 0x3A 0xA6 0x13 0xC8 0x74 0x60
0x52 0x86 0xBB 0x2F 0x9E 0x47 0xF1 0xE4
0xD5 0x09 0x31 0xAF 0x12 0xC5 0x7B 0x61
0x55 0x8B 0xB6 0x24 0x99 0x40 0xF4 0xE5
0xDC 0x02 0x3C 0xA4 0x1D 0xC6 0x7E 0x66
0x5C 0x8C 0xBD 0x2D 0xDE 0x6F 0x77 0x3F
0x5F 0x70 0x1E 0xA8 0xCC 0xA9 0xFD 0xB3
0x68 0xF7 0x06 0x1D 0x9B 0x4E 0xFE 0xEB
0xDE 0x08 0x36 0xAA 0x1F 0xCC 0x70 0x64
0x5E 0x8A 0xB7 0x23 0x9A 0x4B 0xFD 0xE8
0xD1 0x0D 0x3D 0xA3 0x1E 0xC9 0x77 0x65
0x51 0x8F 0xB2 0x28 0x95 0x44 0xF0 0xE9
0xD8 0x06 0x38 0xA8 0x19 0xCA 0x7A 0x6A
0x58 0x80 0xB9 0x21 0x94 0x41 0xF7 0xEE
0xD3 0x0B 0x37 0xA1 0x18 0xC7 0x79 0x6B
0x53 0x85 0xB4 0x2E 0x97 0x42 0xFA 0xEF
0xDA 0x0C 0x32 0xAE 0x1B 0xC0 0x7C 0x68
0x5A 0x8E 0xB3 0x27 0x96 0x4F 0xF9 0xEC
0xDD 0x01 0x39 0xA7 0x1A 0xCD 0x73 0x69
0x5D 0x83 0xBE 0x2C 0x91 0x48 0xFC 0xED
0xD4 0x0A 0x34 0xAC 0x15 0xCE 0x76 0x6E
0x86 0x56 0x67 0xF7 0x76 0x81 0x26 0x17
0x9B 0xEB 0x17 0x50 0x20 0x19 0xA7 0xBD
0x8D 0x5B 0x62 0xF0
The problem I see is that when trying to decrypt past the 256 byte, it blows up because both keys are only 256 bytes in length.
I've tried changing the offset to 0 when it exceeds 255, but I still get junk when trying to display the username.
I just need someone to point me in the right direction.
Any help is appreciated. Thank you.






(Links to C@de Xpl0sion). The author suggested encrypt and decrypt functions were designed to operate between client and proxy. "Encrypt() also decrypts encrypted packets from Server, while decrypt encrypts the decrypted packet".