I had another look, and it seems I don't have the finished version of app I wrote that calculated the keys used in the TQ packets, but I do have a starter version of it that needs a little tweaking.
It may help you though, it comes close, it just needs some minor math adjustments.
The keydetector.rar is the source (VS2010 c#.net)
The rest are just what I could find laying around on my hard drive.
I will say this though, I know for certain they use more than just 4 different xor keys. They tend to use 32byte keys kind of contain 4byte keys that have alternating bytes on the 2nd and 4th byte which are always very close in value, however the 1st and 3rd always remain the same.
They use a new key for every 256bytes, but the keys are easily spotted especially if you stick with the aforementioned rules.
The other rar is just an excel (office 2007) with a couple keys, I can't even say these are right as these would of been the very first ones I did.
Date: 23/10/2011 (so they are about 5months old now)
I had another look, and it seems I don't have the finished version of app I wrote that calculated the keys used in the TQ packets, but I do have a starter version of it that needs a little tweaking.
It may help you though, it comes close, it just needs some minor math adjustments.
The keydetector.rar is the source (VS2010 c#.net)
The rest are just what I could find laying around on my hard drive.
I will say this though, I know for certain they use more than just 4 different xor keys. They tend to use 32byte keys kind of contain 4byte keys that have alternating bytes on the 2nd and 4th byte which are always very close in value, however the 1st and 3rd always remain the same.
They use a new key for every 256bytes, but the keys are easily spotted especially if you stick with the aforementioned rules.
The other rar is just an excel (office 2007) with a couple keys, I can't even say these are right as these would of been the very first ones I did.
Date: 23/10/2011 (so they are about 5months old now)
I meant they use four 256-byte xor keys that they cycle through. Alas, it seems you don't account for the SetKey() exchange that happens after the 41C gets sent Client->Server so I'll begin reversing that now. Here's a proper implementation of the current encryption w/ out the set-keys method:
The keys are repetitive, so I took only first segment of each and just modulate.
BOI Packet Encryption 09/28/2011 - Battle of the Immortals - 13 Replies I've made some research about the packet encryption used in this game and I thought I'd share them.
BOI uses a simple XOR-Algorithm. Each byte of a packet is being XORed with the value of the previous byte. The first byte of every packet indicates its length. Furthermore the first byte of the very first packet sent after the connection was established is being XORed with the value 0xCD.
Example:
Let's say the client sends this packet right after connecting to the server.
0x06 0xA7 0x57...
Packet encryption. 06/22/2009 - Shaiya - 2 Replies Not sure if anyone has tried making a proxy yet, other than the one that is stickied (which is injected and I imagine directly hooks the games send function bypassing the need for encryption?).
Anyway, just curious if anyone knows what sort of encryption is being used on packets?
US server for the record.
Help with Packet Encryption? 04/16/2009 - General Coding - 9 Replies can someone help with these packets? im completely lost lol.i typed in A,B,ABC aand recorded the 3 packets
A
2C 35 52 66 BF 66 15 E1 2C 3A D6 AD E3 29 82 A9 BC C5 EE F5 90 A9 1A 71 0C CD 06 3D FC 3A F6 5C A7 A1 4C 30 63 CD 03 AE 12 A6 20 88 1E C0 E8 95 19 F3 3D A7 42 3A 09 22
B
A7 9E F9 6D D4 5D 9E 6A F7 81 0D D6 B8 22 D9 52 57 8E E5 9E 9B 92 31 9A 97 F6 DD 46 A7 11 ED A7 6C 8A E7 7B 08 F6 48 65 09 EE C8 80 76 78 00 1D 81 8B 85 BF 79 F2 D1 BA
Packet Encryption 02/22/2007 - General Coding - 4 Replies so heute mal nichts zu tun also hab ich mal nach einem opfer ausschau gehalten und stieß dabei auf steam
steam ist wie vermutlich jeder weiß eine online platform zum kaufen und spielen von spielen
einige dinge die ich mir ueberlegt hab:
steam bruter
no-recoil hack fuer cs
ein steam bruter gab es soweit ich weiß noch nicht und koennte sich als sehr nuetzlich erweisen natuerlich sollte er interface unabhaengig sein und rein auf packet basis arbeiten
keke wireshark angeschmissen...
Packet encryption 09/19/2005 - Lineage 2 - 1 Replies Hi,I'm trying to make a simple L2 bot, but i got stuck in begginning - in the packet encryption. I rewrote the l2j login thread sources (those about encryption) but it doesn't work. Has anyone any description of L2 packet encryption. And second question - what Init packet (server packet,nr. 0) means? I guess that it something related with encryption, but in l2j sources that packet content is hardcoded.
Thanks for replies (if any ;) )