Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Conquer Online 2 > CO2 Programming
You last visited: Today at 19:18

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Question]Sniffing and encrypting Packets?

Discussion on [Question]Sniffing and encrypting Packets? within the CO2 Programming forum part of the Conquer Online 2 category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Sep 2006
Posts: 253
Received Thanks: 10
[Question]Sniffing and encrypting Packets?

Hello,

I'm trying to sniff the packets between my client and the server (Official CO),
First of all i want to know, is using Wireshark is a good idea to sniff?

so one of the packets i sniffed is i guess the jump packet sent from my client:


as i understand that the 2 first bytes are for size,
but when converting the hex values, i get big integers, which im pretty sure is not the size of the packet(duhh cuz the packets are encrypted, but worth a try ...)

so ...
I read in some posts, that CO uses 4 keys and the Blowfish algorithm,
and correct me if im wrong:
the first 2 keys are sent to the client (i dont know when?),
then the other 2 keys are calculated later (using the first 2 keys i guess?)

so my question,
where are these 2 keys are sent to the client??
and can i capture them and use them later??

Thank you.
yassine_hell is offline  
Old 08/26/2014, 02:34   #2
 
{ Angelius }'s Avatar
 
elite*gold: 0
Join Date: Aug 2010
Posts: 992
Received Thanks: 1,110
Almost every public source contains an implementation of the encryption algorithm TQ uses. And they have been using Blowfish for as long as i can remember up until Cast 5 was added.

So if i were you i would download one of them, Set it up and debug it to understand what the f is going on.

However i can't answer any if your questions for tow reasons.
1- The fact that your asking such questions tells me that you are totally unfamiliar with Cast/Blowfish algorithms.
2- Any answer that i will provide will be followed by WTF???

Good luck.
{ Angelius } is offline  
Old 08/26/2014, 10:01   #3
 
elite*gold: 0
Join Date: Sep 2006
Posts: 253
Received Thanks: 10
Quote:
Originally Posted by { Angelius } View Post
Almost every public source contains an implementation of the encryption algorithm TQ uses. And they have been using Blowfish for as long as i can remember up until Cast 5 was added.

So if i were you i would download one of them, Set it up and debug it to understand what the f is going on.

However i can't answer any if your questions for tow reasons.
1- The fact that your asking such questions tells me that you are totally unfamiliar with Cast/Blowfish algorithms.
2- Any answer that i will provide will be followed by WTF???

Good luck.
Yea, i read some code, and they mentioned a EncryptionKey like ProxyParadise was using "C238xs65pjy7HU9Q"
Is it the same key till now? (it like from 2011 so i dont think so)
my question is how can i get that EncryptionKey myself?
yassine_hell is offline  
Old 08/26/2014, 10:11   #4


 
KraHen's Avatar
 
elite*gold: 0
Join Date: Jul 2006
Posts: 2,216
Received Thanks: 794
Quote:
Originally Posted by yassine_hell View Post
Yea, i read some code, and they mentioned a EncryptionKey like ProxyParadise was using "C238xs65pjy7HU9Q"
Is it the same key till now? (it like from 2011 so i dont think so)
my question is how can i get that EncryptionKey myself?
Reverse engineering the client.
KraHen is offline  
Old 08/26/2014, 18:14   #5
 
Super Aids's Avatar
 
elite*gold: 0
Join Date: Dec 2012
Posts: 1,761
Received Thanks: 950
Quote:
Originally Posted by yassine_hell View Post
Yea, i read some code, and they mentioned a EncryptionKey like ProxyParadise was using "C238xs65pjy7HU9Q"
Is it the same key till now? (it like from 2011 so i dont think so)
my question is how can i get that EncryptionKey myself?
Super Aids is offline  
Thanks
1 User
Old 08/27/2014, 05:06   #6
 
elite*gold: 0
Join Date: Sep 2006
Posts: 253
Received Thanks: 10
Quote:
Originally Posted by Super Aids View Post
O_O ... BUT .. BUT ....
Thank you ....
yassine_hell is offline  
Old 08/27/2014, 22:32   #7
 
Super Aids's Avatar
 
elite*gold: 0
Join Date: Dec 2012
Posts: 1,761
Received Thanks: 950
Quote:
Originally Posted by yassine_hell View Post
O_O ... BUT .. BUT ....
Thank you ....
But what?
Super Aids is offline  
Old 08/28/2014, 01:17   #8
 
elite*gold: 0
Join Date: Sep 2006
Posts: 253
Received Thanks: 10
Quote:
Originally Posted by Super Aids View Post
But what?
So simple ... didn't except that at all ...
some ppl here are just making it seem HARD
yassine_hell is offline  
Old 08/28/2014, 04:03   #9
 
Spirited's Avatar
 
elite*gold: 12
Join Date: Jul 2011
Posts: 8,282
Received Thanks: 4,191
Quote:
Originally Posted by yassine_hell View Post
So simple ... didn't except that at all ...
some ppl here are just making it seem HARD
Well, that's not reverse engineering. That's just opening an executable in notepad and showing constant strings that have ASCII/CP1252 encoding. Private servers have a tendency to change the location and format of that string, which can complicate things just a little bit.
Spirited is offline  
Old 08/28/2014, 05:42   #10
 
elite*gold: 0
Join Date: Sep 2006
Posts: 253
Received Thanks: 10
Quote:
Originally Posted by Spirited View Post
Well, that's not reverse engineering. That's just opening an executable in notepad and showing constant strings that have ASCII/CP1252 encoding. Private servers have a tendency to change the location and format of that string, which can complicate things just a little bit.
Yea, i know, i mean the finding of that key,
another thing i read in that executable, is AES, 0.o what are they using it for, packets still enrypted using Blowfish right?
yassine_hell is offline  
Old 08/28/2014, 06:58   #11
 
Spirited's Avatar
 
elite*gold: 12
Join Date: Jul 2011
Posts: 8,282
Received Thanks: 4,191
Quote:
Originally Posted by yassine_hell View Post
Yea, i know, i mean the finding of that key,
another thing i read in that executable, is AES, 0.o what are they using it for, packets still enrypted using Blowfish right?
If I'm not mistaking, it might be for Server.dat. The client has the ability to decrypt the file, but not encrypt it (so don't get any ideas).
Spirited is offline  
Old 08/28/2014, 12:02   #12
 
Super Aids's Avatar
 
elite*gold: 0
Join Date: Dec 2012
Posts: 1,761
Received Thanks: 950
Conquer has used multiple different encryptions and currently uses a few. I don't know the exact ones they use right now since I am not up to date, but I assume their "custom" auth encryption, RC5 (password right?) and CAST5 atm. Might be wrong, but yah.

Quote:
Originally Posted by Spirited View Post
If I'm not mistaking, it might be for Server.dat. The client has the ability to decrypt the file, but not encrypt it (so don't get any ideas).
If you can reverse the decryption, you can make the encryption.
Super Aids is offline  
Thanks
1 User
Old 08/28/2014, 19:18   #13


 
CptSky's Avatar
 
elite*gold: 0
Join Date: Jan 2008
Posts: 1,443
Received Thanks: 1,175
Quote:
Originally Posted by Spirited View Post
If I'm not mistaking, it might be for Server.dat. The client has the ability to decrypt the file, but not encrypt it (so don't get any ideas).
RSA is used to encrypt the server.dat file. AES is probably residual code from linking OpenSSL.

Quote:
Originally Posted by Super Aids View Post
Conquer has used multiple different encryptions and currently uses a few. I don't know the exact ones they use right now since I am not up to date, but I assume their "custom" auth encryption, RC5 (password right?) and CAST5 atm. Might be wrong, but yah.

If you can reverse the decryption, you can make the encryption.
RC5 is still used for the password encryption ? I though they added a custom one at some point. Anyway, TQ used commonly RC5, Blowfish & CAST5.

True for most algorithms, false for RSA. You can reverse the algorithm, but, you need the private key for encrypting the file. It is not available and only the public key (used to decrypt the file) is in the executable. You can always generate a new private-public keys pair, and update the executable.
CptSky is offline  
Old 08/28/2014, 19:37   #14
 
Super Aids's Avatar
 
elite*gold: 0
Join Date: Dec 2012
Posts: 1,761
Received Thanks: 950
I have no idea if RC5 is still used, like I said I am not up to date. I haven't touched Conquer past monks.
Super Aids is offline  
Reply


Similar Threads Similar Threads
[Tutorial] Packets - Sniffing & Analysis
02/07/2018 - Coding Tutorials - 149 Replies
ENGLISH : Packets - Sniffing & Analysis The tutorial was written by me (al_j alias Cholik alias Walter Sobchak) for the elitepvpers-board. Copy it to other boards if you want but please give credits to me and the elitepvpers board. UPDATE] - 082408 - Added another Chapter to the Packet Analysis named "Extended Structure Analysis"
on sniffing packets.
03/01/2012 - Rappelz Private Server - 0 Replies
Is there a preferred sniffer or can one just use wireshark? I'm thinking that being as how pyroc has stated that the packets have changed I'll have to start with some sniffing and then build a dummy logon server. Once that is done well open up the possibility of getting the other packets and try to figure how to build from there. And Yes I understand this will be a LONG process, however I will commit to it being an OPEN SOURCE project, including a GPL and everything. If There are those truly...
Packets sniffing help
06/09/2010 - SRO Private Server - 0 Replies
Hey all =) hope u're ok i've been trying to sniff swsro packets, but i cant find the right program to do it, in ecsro, i used to use projecthax analyzer, but in swsro, everytime i try to inject a packet using it, the client crashes, i tried to use edx33 also, but i couldn't make it work also any idea ?
[ENG]Sniffing packets, how to learn
09/07/2008 - Kal Online - 24 Replies
Ok i am interested in learning how to sniff packets, what program do i need to use and how to start doing it, obviously it is hard to start with kal since it is cripted data, bla bla... Since i am dumb and don't know much about it is there a site or is there a tutorial here on epvp that i can use? From what i understand packet sniffing is easy if the packets are not cripted and if there is no or low security on the game you are trying to sniff. Since i don't even know what to ask could...



All times are GMT +1. The time now is 19:20.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.