I had no luck with it since instructions are in thai or something like that.
Can you pls help me to understand how this crack work?
EDIT: ok, I read more deeply through the threads and I found out that you knew about this already. So I'm sorry for the oldness of the trick.
Since you could make this work, can you explain me in English how the stuff works?
Thx in advance for help.
RE-EDIT: I got that stuff working doing the stuff myself as on the web there're lots of mistakes so I gave a read back at how tcp tunnelling works as I'm a young computing science student.
Aside from that, I guess that a future crack could be like this:
- use ollybg (in case you have an NT kernel based OS) or softice (in case you have Windows 98/ME) and see what happens when you get connected to the chinese server and what happens when you get connected to a normal server;
- converting as usual conditional calls in non conditional calls with windasm32.
- repeat it for the future versions when the chinese server loopback trick will be patched.
P.S.:
I'll leave written here how the loopback thing works:
First have a look at this to know what's behind this trick:

So this is how it works:
- open the file c:\windows\system32\drivers\et c\hosts
and append to the end of the file this:
61.152.151.250 auth.lineage2.com.cn
//
DIAGRAM
A -> B -> C
A = the computer of ours (which has the tcp tunnel listening at flowing traffic on the port 2106)
B = our computer mimicking the chinese auth server thx to the loopback trick
C = the american auth server (which we connect to via the port 2106).
So as soon as the socket connection gets broken to the chinese server, because putting in hosts the ip of the chinese server we block that ip, our connection is redirected to the american server and the traffic flows directly from A to C.
//
-download a program called tcp tunnel (I found it googling quite easily, but if I'll get the nerve I'll post a link later).
As you are done with downloading, extract the contents into a directory with a name you will remember (for instance tcp_tunnel).
- open the notepad and write this:
tcptunnel -listenport 2106 -tohost 206.127.151.66 -toport 2106
pause
Write that exactly the way you see it, so "tcp tunnel..." goes on the first line and pause on the second line
That's a script. It executes 2 command lines. The first has the goal to redirect the network traffic that flows through the port 2106 to the american server always through the port 2106 (since even the american auth server uses that port), the second has the aim not to get the program closed a while later we run it as windows is a shit.
So not only Linux has scripting hehe. :P
Now save it in the directory where you extracted the Tcp Tunnel program with any name you like (for instance port_forward) and pay attention to put the extension .bat (so you'll obtain something like port_forward.bat).
- Create a loopback network adapter with "add hardware".
You have just to take the list of the categories of hardware you can install, next click on network devices, on the left you will see "microsoft" and on the right there's something like "microsoft loopback adapter".
- so now go to the control pannel, get into the properties of "Local Area Connection" (the one referred to the loopback adapter we created a while ago).
Let's get into the properties of tcp/ip, and put in this IP address 61.152.151.250.
- open the file port_forward.bat that we created before.
Run L2Walker, cross your fingers, select the chinese server, select the number of the server and the one of the character, insert your log-in data, have a breath, click on login and you are in. :P
- in the future, as tcp tunnel is a shareware program and it lasts 30 days, you'll need this command line to reset the program counter so you can use it again:
del c:\windows\system32\msrtdgltbl.srq
You can make a .bat file with that and name it as you want like we did before.
I wanna conclude this saying that there are lots of mistakes on the web about the IP addresses to put into hosts and in the adapter TCP/IP box.






