Quote:
Originally Posted by CrystalCastle
what about the new way password hash is generated :P?

|
Look in immune's source for an example of how to use the liberate cryptography.dll (the source code to which was originally posted on epvp a while ago).
It works perfectly fine...
You are using the password seed to set up a new pass cryptographer, setting up your rc5key and then running it through the decryption using the username, correct?
Random example from my old source. (almost exact copy/paste from immune's source cause well... it worked ahaha)
Code:
msvcrt.msvcrt.srand(Client.PassSeed);
var rc5Key = new byte[0x10];
for (int i = 0; i < 0x10; i++)
rc5Key[i] = (byte)msvcrt.msvcrt.rand();
Pass = Encoding.ASCII.GetString(
(new ConquerPasswordCryptpographer(User).Decrypt(new Encryption.RC5(rc5Key).Decrypt(Password))));
Pass = Pass.Replace("\0", "");