|
You last visited: Today at 22:01
Advertisement
[AutoIT] Sending Packets Help
Discussion on [AutoIT] Sending Packets Help within the SRO Coding Corner forum part of the Silkroad Online category.
08/05/2011, 00:00
|
#16
|
elite*gold: 0
Join Date: Sep 2010
Posts: 783
Received Thanks: 921
|
Quote:
Originally Posted by DeXeee
Huh, buffs dont want to work ... :S
Code:
[C -> S][7074]
01
04
14 05 00 00
00
I use this method to get "AppendWord2()" :
Code:
#include <string.au3>
Global $sBuffer, $rBuffer
Global $iSize, $iIndex
MsgBox(0,"",Dec(ReverseHex("14050000")))
Func ReverseHex($sString)
Local $sTemp, $i
For $i = StringLen($sString) +1 To 1 Step -2
$sTemp &= StringMid($sString, $i, 2)
Next
Return $sTemp
EndFunc ;==>ReverseHex
For 14050000 i got 1300 and put it in AppendWord2()
So, this is the final :
Code:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendWord2(1300)
AppendByte2(0)
Was I wrong somewhere ? 
|
well, you should put 1 instead of 2 in security
look : 0100 (1) = C->S
0200 (2) = S->C
0300 (3) = C->S (Encrypted)
0400 (4) = S->C (Encrypted)
|
|
|
08/05/2011, 00:04
|
#17
|
elite*gold: 0
Join Date: Aug 2009
Posts: 218
Received Thanks: 171
|
Quote:
Originally Posted by ÑõÑ_Ŝŧóp
well, you should put 1 instead of 2 in security
look : 0100 (1) = C->S
0200 (2) = S->C
0300 (3) = C->S (Encrypted)
0400 (4) = S->C (Encrypted)
|
Its (2) for C -> S
and (1) for S -> C
I make it work , here is the code how it need to look like :
Code:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendByte2(20)
AppendByte2(5)
AppendByte2(0)
AppendByte2(0)
AppendByte2(0)
|
|
|
08/05/2011, 00:26
|
#18
|
elite*gold: 0
Join Date: Sep 2010
Posts: 783
Received Thanks: 921
|
Quote:
Originally Posted by DeXeee
Its (2) for C -> S
and (1) for S -> C
I make it work , here is the code how it need to look like :
Code:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendByte2(20)
AppendByte2(5)
AppendByte2(0)
AppendByte2(0)
AppendByte2(0)
|
hmm maybe
didn't work with sr proxy b4  !
in phConnector its like what i said
btw it shouldn't look like that
it should be :
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendDWord2(1300) ; dword not word
AppendByte2(0)
|
|
|
08/05/2011, 00:35
|
#19
|
elite*gold: 0
Join Date: Dec 2007
Posts: 3,210
Received Thanks: 6,301
|
Try with:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendByte2(13)
AppendByte2(0)
AppendByte2(0)
|
|
|
08/05/2011, 00:56
|
#20
|
elite*gold: 0
Join Date: Aug 2009
Posts: 218
Received Thanks: 171
|
Quote:
Originally Posted by Synx7
Try with:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendByte2(13)
AppendByte2(0)
AppendByte2(0)
|
It's not working, only like this :
Code:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendByte2(251)
AppendByte2(4)
AppendByte2(0)
AppendByte2(0)
AppendByte2(0)
Here is the next question
How to select a mob, becouse every mob have deferent id ( idk how to say it )
I find in iBot Data some informations and idk can i use it :
"8D070000","MOB_CH_MANGNYANG","Mangyang",54
|
|
|
08/05/2011, 01:45
|
#21
|
elite*gold: 0
Join Date: Sep 2010
Posts: 783
Received Thanks: 921
|
Quote:
Originally Posted by DeXeee
It's not working, only like this :
Code:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendByte2(251)
AppendByte2(4)
AppendByte2(0)
AppendByte2(0)
AppendByte2(0)
Here is the next question
How to select a mob, becouse every mob have deferent id ( idk how to say it )
I find in iBot Data some informations and idk can i use it :
"8D070000","MOB_CH_MANGNYANG","Mangyang",54
|
well
to select mob
you need to parse group/single spawn to get the object ip which you'll use to select the mob.
and thats not easy.
group spawn opcode : 0x3019
single spawn : 0x3015
(esro)
dunno about isro atm ..
|
|
|
08/05/2011, 03:09
|
#22
|
elite*gold: 0
Join Date: Jan 2010
Posts: 360
Received Thanks: 249
|
Quote:
Originally Posted by DeXeee
Huh, buffs dont want to work ... :S
Code:
[C -> S][7074]
01
04
14 05 00 00
00
I use this method to get "AppendWord2()" :
Code:
#include <string.au3>
Global $sBuffer, $rBuffer
Global $iSize, $iIndex
MsgBox(0,"",Dec(ReverseHex("14050000")))
Func ReverseHex($sString)
Local $sTemp, $i
For $i = StringLen($sString) +1 To 1 Step -2
$sTemp &= StringMid($sString, $i, 2)
Next
Return $sTemp
EndFunc ;==>ReverseHex
For 14050000 i got 1300 and put it in AppendWord2()
So, this is the final :
Code:
AppendOpCode2(0x7074)
AppendSecurity2(2)
AppendByte2(1)
AppendByte2(4)
AppendWord2(1300)
AppendByte2(0)
Was I wrong somewhere ? 
|
14 05 00 00 is a DWord and not a Word
|
|
|
08/05/2011, 03:41
|
#23
|
elite*gold: 166
Join Date: Apr 2009
Posts: 2,341
Received Thanks: 2,661
|
+ @zerapains post
byte (uint8) - 00
word (uint16) - 00 00
dword ( uint32 ) - 00 00 00 00
qword (uint64) im not sure also if its "q" - 00 00 00 00 00 00 00 00
@dexee
to select mobs, you should parse the spawn packets which server sends you and make list of them with their ids. And select one from list , ( calculating the x,y first )
|
|
|
08/05/2011, 19:12
|
#24
|
elite*gold: 0
Join Date: Aug 2009
Posts: 218
Received Thanks: 171
|
Quote:
Originally Posted by sarkoplata
@dexee
to select mobs, you should parse the spawn packets which server sends you and make list of them with their ids. And select one from list , ( calculating the x,y first )
|
I cant make it to recive the packet ..
I was trying with TCPListen("127.0.0.1",15778)
and then :
Code:
$accept = TCPAccept($listen)
If $accept = -1 Then
ToolTip($accept & " Not Connected")
Sleep(1000)
Exit
EndIf
Its always -1 :S
|
|
|
08/05/2011, 19:18
|
#25
|
elite*gold: 0
Join Date: Jan 2010
Posts: 1,484
Received Thanks: 809
|
try TCPRecv or TCPReceive idk how it's called in autoit. You only connect to the proxy and the proxy sends all the packets C -> S and S -> C to your autoit program.
|
|
|
08/05/2011, 19:49
|
#26
|
elite*gold: 0
Join Date: Aug 2009
Posts: 218
Received Thanks: 171
|
Quote:
Originally Posted by kevin_owner
try TCPRecv or TCPReceive idk how it's called in autoit. You only connect to the proxy and the proxy sends all the packets C -> S and S -> C to your autoit program.
|
I make it ...
But i am just receive something like thins :
Code:
0x180021B00200E8C0F00101A8600703C9FFE70001A8605B21CAEF5EC21707
What to do with this ?
I am sure that i need to convert to something, but idk how ..
|
|
|
08/05/2011, 20:24
|
#27
|
elite*gold: 0
Join Date: Jan 2010
Posts: 360
Received Thanks: 249
|
it's your packet.
not necessary to convert anything, you have to interpret it now.
|
|
|
08/05/2011, 21:20
|
#28
|
elite*gold: 0
Join Date: Aug 2009
Posts: 218
Received Thanks: 171
|
Quote:
Originally Posted by ZeraPain
it's your packet.
not necessary to convert anything, you have to interpret it now.
|
Yea, but i rly dont understand anything here
Is there any way to convert it to look like in edxloader analyzer ?
|
|
|
08/05/2011, 21:29
|
#29
|
elite*gold: 0
Join Date: Jan 2010
Posts: 1,484
Received Thanks: 809
|
No there isn't you have to do that by yourself so you have to read the packet.
the first 6 bytes are always the same format which is:
WORD Size
WORD Opcode
BYTE Security01
BYTE Security02
Everything after this is the data well the Size which is the first 2 bytes tells you how long the actual data is. What you have to do now is to go ingame with edxSilkroadLoader and use the analyzer so you get parsed packets and implement those in your program.
This takes a lot of time cause there are a lot of bytes which are 0 and if they change to 1 there is some extra data but overall it's very time consuming and the spawn packets aren't easy to start with cause I assume you are a beginner at the whole packet thing.
|
|
|
08/05/2011, 23:00
|
#30
|
elite*gold: 0
Join Date: Aug 2009
Posts: 218
Received Thanks: 171
|
This is the code that i got with my programm and i compare it with edx analyzer :
Code:
0x3900153002008D070000 (#1)9AE70E00 A860CDA874442D0E1FC2CCF96F4480CC0101 (#3)A860 (#4)F803 (#5)F5FF (#6)4A03 (#7)01 00030000000000410000B0410000C842000201050004
Code:
[S -> C][B021]
#1 - 9A E7 0E 00
#2 - 01
#3 - A8 60
#4 - F8 03
#5 - F5 FF
#6 - 4A 03
#7 - 01
#8 - A8 60
#9 - 99 23
#10 - C4 FA 37 C1
#11 - CA 2D
I cant find from #8 to #11, or i maybe do it wrong :S
And maybe i compare two different packets ...
|
|
|
 |
|
Similar Threads
|
Sending Packets
03/26/2019 - PW Hacks, Bots, Cheats, Exploits - 432 Replies
As per Smurfin's request:
reposting of what I posted in the Prophet's bot thread.
some example of functions you could use with sending packets (AutoIt code, see link below for C#):
;////Code for sending packets.
|
Help with sending packets in autoit
08/16/2010 - AutoIt - 1 Replies
ive been lookin around different sites for ways to send packets to the game server. the only examples i see is to create a server and a client which i dont need, i think. well to the point now, can someone lead me in a direction or tell me how to send packets to a game? also if i send packets then that means i dont need the game to be active, correct? Because in autoit when u use keys u need to have the game active, and control send does not work. ty
|
Sending Packets !!!
09/07/2008 - Kal Online - 14 Replies
now i know how to sniff / analyse packets ... but what then ? :)
how can i send packets ?? to pimp or mix weapon for example
i just need the way to send , and then i can depend on myself :D
|
Scamming by sending packets???
04/15/2006 - Conquer Online 2 - 1 Replies
Well my friend and i came up with the idea to send packets to the server to show a certain item in the trade window. We want to use this as a type of scam. I didnt see this in any other threads and was wondering if anyone knew if this is possible and if they could point use in the right direction. My friend was pretty good with packets in CO 1.0 but we arent really sure to go about doing it. If anyone one could please lend a helping hand?
P.S.- Before I get flamed for this because i know i...
|
Sending packets
10/12/2005 - Conquer Online 2 - 10 Replies
I've a question. Is it possible to send 1 packet multiple times at the exact same time?
|
All times are GMT +1. The time now is 22:02.
|
|