I need help to find the keys for the decryption of packets of CrazyTao.
In EUDemons C# servers those Keys are used:
Code:
private byte[] m_Key1 = {
0x9D, 0x90, 0x83, 0x8A, 0xD1, 0x8C, 0xE7, 0xF6, 0x25, 0x28, 0xEB, 0x82, 0x99, 0x64, 0x8F, 0x2E,
0x2D, 0x40, 0xD3, 0xFA, 0xE1, 0xBC, 0xB7, 0xE6, 0xB5, 0xD8, 0x3B, 0xF2, 0xA9, 0x94, 0x5F, 0x1E,
0xBD, 0xF0, 0x23, 0x6A, 0xF1, 0xEC, 0x87, 0xD6, 0x45, 0x88, 0x8B, 0x62, 0xB9, 0xC4, 0x2F, 0x0E,
0x4D, 0xA0, 0x73, 0xDA, 0x01, 0x1C, 0x57, 0xC6, 0xD5, 0x38, 0xDB, 0xD2, 0xC9, 0xF4, 0xFF, 0xFE,
0xDD, 0x50, 0xC3, 0x4A, 0x11, 0x4C, 0x27, 0xB6, 0x65, 0xE8, 0x2B, 0x42, 0xD9, 0x24, 0xCF, 0xEE,
0x6D, 0x00, 0x13, 0xBA, 0x21, 0x7C, 0xF7, 0xA6, 0xF5, 0x98, 0x7B, 0xB2, 0xE9, 0x54, 0x9F, 0xDE,
0xFD, 0xB0, 0x63, 0x2A, 0x31, 0xAC, 0xC7, 0x96, 0x85, 0x48, 0xCB, 0x22, 0xF9, 0x84, 0x6F, 0xCE,
0x8D, 0x60, 0xB3, 0x9A, 0x41, 0xDC, 0x97, 0x86, 0x15, 0xF8, 0x1B, 0x92, 0x09, 0xB4, 0x3F, 0xBE,
0x1D, 0x10, 0x03, 0x0A, 0x51, 0x0C, 0x67, 0x76, 0xA5, 0xA8, 0x6B, 0x02, 0x19, 0xE4, 0x0F, 0xAE,
0xAD, 0xC0, 0x53, 0x7A, 0x61, 0x3C, 0x37, 0x66, 0x35, 0x58, 0xBB, 0x72, 0x29, 0x14, 0xDF, 0x9E,
0x3D, 0x70, 0xA3, 0xEA, 0x71, 0x6C, 0x07, 0x56, 0xC5, 0x08, 0x0B, 0xE2, 0x39, 0x44, 0xAF, 0x8E,
0xCD, 0x20, 0xF3, 0x5A, 0x81, 0x9C, 0xD7, 0x46, 0x55, 0xB8, 0x5B, 0x52, 0x49, 0x74, 0x7F, 0x7E,
0x5D, 0xD0, 0x43, 0xCA, 0x91, 0xCC, 0xA7, 0x36, 0xE5, 0x68, 0xAB, 0xC2, 0x59, 0xA4, 0x4F, 0x6E,
0xED, 0x80, 0x93, 0x3A, 0xA1, 0xFC, 0x77, 0x26, 0x75, 0x18, 0xFB, 0x32, 0x69, 0xD4, 0x1F, 0x5E,
0x7D, 0x30, 0xE3, 0xAA, 0xB1, 0x2C, 0x47, 0x16, 0x05, 0xC8, 0x4B, 0xA2, 0x79, 0x04, 0xEF, 0x4E,
0x0D, 0xE0, 0x33, 0x1A, 0xC1, 0x5C, 0x17, 0x06, 0x95, 0x78, 0x9B, 0x12, 0x89, 0x34, 0xBF, 0x3E};
private byte[] m_Key2 = {
0x62, 0x4F, 0xE8, 0x15, 0xDE, 0xEB, 0x04, 0x91, 0x1A, 0xC7, 0xE0, 0x4D, 0x16, 0xE3, 0x7C, 0x49,
0xD2, 0x3F, 0xD8, 0x85, 0x4E, 0xDB, 0xF4, 0x01, 0x8A, 0xB7, 0xD0, 0xBD, 0x86, 0xD3, 0x6C, 0xB9,
0x42, 0x2F, 0xC8, 0xF5, 0xBE, 0xCB, 0xE4, 0x71, 0xFA, 0xA7, 0xC0, 0x2D, 0xF6, 0xC3, 0x5C, 0x29,
0xB2, 0x1F, 0xB8, 0x65, 0x2E, 0xBB, 0xD4, 0xE1, 0x6A, 0x97, 0xB0, 0x9D, 0x66, 0xB3, 0x4C, 0x99,
0x22, 0x0F, 0xA8, 0xD5, 0x9E, 0xAB, 0xC4, 0x51, 0xDA, 0x87, 0xA0, 0x0D, 0xD6, 0xA3, 0x3C, 0x09,
0x92, 0xFF, 0x98, 0x45, 0x0E, 0x9B, 0xB4, 0xC1, 0x4A, 0x77, 0x90, 0x7D, 0x46, 0x93, 0x2C, 0x79,
0x02, 0xEF, 0x88, 0xB5, 0x7E, 0x8B, 0xA4, 0x31, 0xBA, 0x67, 0x80, 0xED, 0xB6, 0x83, 0x1C, 0xE9,
0x72, 0xDF, 0x78, 0x25, 0xEE, 0x7B, 0x94, 0xA1, 0x2A, 0x57, 0x70, 0x5D, 0x26, 0x73, 0x0C, 0x59,
0xE2, 0xCF, 0x68, 0x95, 0x5E, 0x6B, 0x84, 0x11, 0x9A, 0x47, 0x60, 0xCD, 0x96, 0x63, 0xFC, 0xC9,
0x52, 0xBF, 0x58, 0x05, 0xCE, 0x5B, 0x74, 0x81, 0x0A, 0x37, 0x50, 0x3D, 0x06, 0x53, 0xEC, 0x39,
0xC2, 0xAF, 0x48, 0x75, 0x3E, 0x4B, 0x64, 0xF1, 0x7A, 0x27, 0x40, 0xAD, 0x76, 0x43, 0xDC, 0xA9,
0x32, 0x9F, 0x38, 0xE5, 0xAE, 0x3B, 0x54, 0x61, 0xEA, 0x17, 0x30, 0x1D, 0xE6, 0x33, 0xCC, 0x19,
0xA2, 0x8F, 0x28, 0x55, 0x1E, 0x2B, 0x44, 0xD1, 0x5A, 0x07, 0x20, 0x8D, 0x56, 0x23, 0xBC, 0x89,
0x12, 0x7F, 0x18, 0xC5, 0x8E, 0x1B, 0x34, 0x41, 0xCA, 0xF7, 0x10, 0xFD, 0xC6, 0x13, 0xAC, 0xF9,
0x82, 0x6F, 0x08, 0x35, 0xFE, 0x0B, 0x24, 0xB1, 0x3A, 0xE7, 0x00, 0x6D, 0x36, 0x03, 0x9C, 0x69,
0xF2, 0x5F, 0xF8, 0xA5, 0x6E, 0xFB, 0x14, 0x21, 0xAA, 0xD7, 0xF0, 0xDD, 0xA6, 0xF3, 0x8C, 0xD9};
Code:
Key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ey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ts used the same, so with the comma's and 0x in front of every HEX token.
Problem is with CrazyTao, with those keys, it won't decrypt the packets the right way..
Is there anybody around here, that would like to help me find out what TQ used for CrazyTao, and would like to explain to me how to get those keys?
If i got those keys, i can go on developing a C# server for CrazyTao ;-)!
Thanks in advance!






