Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Conquer Online 2 > CO2 Programming
You last visited: Today at 02:01

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



Memory Address of Post Encrypted Send Packet

Discussion on Memory Address of Post Encrypted Send Packet within the CO2 Programming forum part of the Conquer Online 2 category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
Memory Address of Post Encrypted Send Packet

Currently I am working on memory based proxy but I have a problem in finding the address of the pre-encrypted send packet data. I think i found out the address of the receive packet(from server), as per attached, but I'm not sure it that was really the address.

Anyone please help me how to locate the address of pre-encrypted send packet.

The title is misleading but I mean Post-decryption of receive packet buffer and pre-encryption of send packet buffer.
Attached Images
File Type: jpg tq server.jpg (160.6 KB, 107 views)
xmen01235 is offline  
Old 10/13/2010, 16:23   #2
 
gabrola's Avatar
 
elite*gold: 0
Join Date: Dec 2006
Posts: 1,039
Received Thanks: 1,335
Well if you need post-encryption packets just hook the winsock send methods. Unless you mean pre-encryption/post-decryption, well I don't have much info, but from your screenshot, that seems to be the packet buffer address.
gabrola is offline  
Thanks
1 User
Old 10/13/2010, 16:49   #3
 
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
Quote:
Originally Posted by gabrola View Post
Well if you need post-encryption packets just hook the winsock send methods. Unless you mean pre-encryption/post-decryption, well I don't have much info, but from your screenshot, that seems to be the packet buffer address.
I need the pre-encryption and post-decryption buffer data bro.
xmen01235 is offline  
Old 10/13/2010, 20:36   #4
 
elite*gold: 20
Join Date: Aug 2007
Posts: 1,749
Received Thanks: 2,198
You need to find some place in Conquer.exe where the un-encrypted packet is accessed from. The smartest thing is to find the function that encrypts and sends packets to the server, hook the function (using whatever method you feel like using), and read/edit the parameters of the function (the parameters are most likely something like packet address and packet size)
IAmHawtness is offline  
Thanks
1 User
Old 10/14/2010, 14:14   #5


 
KraHen's Avatar
 
elite*gold: 0
Join Date: Jul 2006
Posts: 2,216
Received Thanks: 793
Can`t you decrypt it? o.0
KraHen is offline  
Old 10/14/2010, 20:25   #6
 
Ian*'s Avatar
 
elite*gold: 0
Join Date: Nov 2006
Posts: 805
Received Thanks: 464
Quote:
Originally Posted by KraHen View Post
Can`t you decrypt it? o.0
There's no need to decrypt it when you can make the client encrypt and decrypt it for you
Ian* is offline  
Thanks
1 User
Old 10/15/2010, 08:11   #7
 
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
Quote:
Originally Posted by IAmHawtness View Post
You need to find some place in Conquer.exe where the un-encrypted packet is accessed from. The smartest thing is to find the function that encrypts and sends packets to the server, hook the function (using whatever method you feel like using), and read/edit the parameters of the function (the parameters are most likely something like packet address and packet size)
Yah I tried searching it bro but it is like I am searching a single sand in the beach, I mean I am so noob in this memory thingy. I read some basic on hooking and I think I need to study assembly 101 first.

But while checking back my screenshot, I can really conclude that it is the buffer address and I think this is where SV had been develop. I am developing one application now to use that information to create my own bot similar to SV. I am using the PostMessage of mouse and keyboard to automate my client while I am updating the client information via that receive buffer. But one thing i am worried is the mouse background checker of the conquer client or at least someone give me an idea how to defeat the background checker of conquer client without editing the client itself.

So my plan right now will be like this as follows:
1. I will read the receive buffer and since I have already a packet based proxy then I have also the structure of most of the important packet so it will be easier for me to map the several packet into my application.
2. Find a best method to use Postmessage mouseclick while defeating the client background checker.
3. I will implement a Postmessage mouseclick in my application, in automating the action from my client(e.g. attacking monster,jumping, fbing and etc.)

And planning to implement it in VB dot net.
Quote:
Originally Posted by KraHen View Post
Can`t you decrypt it? o.0
Actually I can but I just want to get rid with the en/de things since anytime TQ can change their en/de. Just making my bot live like forever :P.(I also have my own customized packet based proxy, but I'm not planning to release it yet).

Quote:
Originally Posted by Ian* View Post
There's no need to decrypt it when you can make the client encrypt and decrypt it for you
Yah exactly bro. Hope you will share your knowledge to us :P...
xmen01235 is offline  
Old 10/15/2010, 23:50   #8
 
elite*gold: 20
Join Date: Aug 2007
Posts: 1,749
Received Thanks: 2,198
Quote:
Originally Posted by xmen01235 View Post
Yah I tried searching it bro but it is like I am searching a single sand in the beach, I mean I am so noob in this memory thingy. I read some basic on hooking and I think I need to study assembly 101 first.

But while checking back my screenshot, I can really conclude that it is the buffer address and I think this is where SV had been develop. I am developing one application now to use that information to create my own bot similar to SV. I am using the PostMessage of mouse and keyboard to automate my client while I am updating the client information via that receive buffer. But one thing i am worried is the mouse background checker of the conquer client or at least someone give me an idea how to defeat the background checker of conquer client without editing the client itself.

So my plan right now will be like this as follows:
1. I will read the receive buffer and since I have already a packet based proxy then I have also the structure of most of the important packet so it will be easier for me to map the several packet into my application.
2. Find a best method to use Postmessage mouseclick while defeating the client background checker.
3. I will implement a Postmessage mouseclick in my application, in automating the action from my client(e.g. attacking monster,jumping, fbing and etc.)

And planning to implement it in VB dot net.


Actually I can but I just want to get rid with the en/de things since anytime TQ can change their en/de. Just making my bot live like forever :P.(I also have my own customized packet based proxy, but I'm not planning to release it yet).



Yah exactly bro. Hope you will share your knowledge to us :P...
I would recommend that you use functions from inside Conquer.exe instead of sending mouse-click messages to the Conquer window using PostMessage. Unless you know how to convert in-game coordinates to mouse coordinates, it's really not a good idea.
IAmHawtness is offline  
Old 10/17/2010, 13:02   #9


 
Korvacs's Avatar
 
elite*gold: 20
Join Date: Mar 2006
Posts: 6,125
Received Thanks: 2,518
Why would you want or even need to send mouse/keyboard messages to the client when you have complete control over send and receive. Just use the client to decrypt/encrypt and have your bot do all the work.
Korvacs is offline  
Thanks
1 User
Old 10/20/2010, 02:59   #10
 
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
Quote:
Originally Posted by Korvacs View Post
Why would you want or even need to send mouse/keyboard messages to the client when you have complete control over send and receive. Just use the client to decrypt/encrypt and have your bot do all the work.
If I am very good in hooking then I will really do that way bro but I'm still studying this method. I am looking for some basic example in the net right now and hopefully I can make one for this purpose. Assembly is very painful for my eyes and how I wish I can learn it in quickest time lol.

Btw, thanks a lot for your encryption wiki it really helps a lot on my packet structuring .
xmen01235 is offline  
Reply


Similar Threads Similar Threads
Play sound via Packet Send?? [Question String Packet]
07/14/2010 - CO2 Private Server - 5 Replies
Yow im trying to figure out why i cant play music with the string packet What im doin is; MyChar.Client.SendPacket(Game.Packet.String(MyCha r.UID, 20, Splitter)); My Packet is: public byte String(long CharId, byte Type, string name)
memory address
12/07/2007 - Conquer Online 2 - 3 Replies
is it possible for memory address the monster count i could use 1 for 300 kills monster :P



All times are GMT +2. The time now is 02:01.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.