Screens:
or sniffing, I wrote a Wireshark dissector plugin in C but it's not yet released. A screen:
- Wireshark Florensia dissector:
Instructions:
1. Install stackless python (2.6.1).
2. Copy FlorensiaEN.bin (in the Bin directory) and change the Account Server IP to your local server with a hex editor. Save your changes to the copy.
As of april 30, the list of IPs can be found at offset 0x0077AD68 (7843190). I think changing the first instance is enough but change all of them to be on the safe side.
If the location changes, search for "217.110.102.82" in clear text and you'll be in the right place.
3. If you wish to disable HShield, these changes should be enough:
Code:
- 0x006B4773: 0F 84 80 00 00 00 to E9 81 00 00 00 90 - 0x006B4834: 0F 84 19 01 00 00 to E9 1A 01 00 00 90 - 0x006B4AC6: 74 to EB - 0x006B4D18: E9 81 06 00 00 to 90 90 90 90 90 - 0x006B4D2B: E9 6E 06 00 00 to 90 90 90 90 90 - 0x006B4D46: 75 18 to 90 90 - 0x006B4D76: E9 23 06 00 00 to 90 90 90 90 90 - 0x006B4DC0: E9 D9 05 00 00 to 90 90 90 90 90 - 0x006B50FA: E9 9F 02 00 00 to 90 90 90 90 90
5. If you wish to be able to connect to both your local server and the official, create a .bat file in the Bin directory and put this in:
Code:
@ECHO OFF start FlorensiaEN_with_local_ip_and_optionally_hshield_modifications.bin
Code:
Start
6. Launch your .bat file and login with account flod/test
Unfortunately I won't be working on this much further. This project was just for practice and I don't play the game. There are lots of unknown/incorrect packets, so if you want something to reverse, look no further.

Credits: sullivan7






