Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Silkroad Online > SRO Coding Corner
You last visited: Today at 10:38

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



Question about packet analysers / sniffers

Discussion on Question about packet analysers / sniffers within the SRO Coding Corner forum part of the Silkroad Online category.

Reply
 
Old   #1
 
LuigiChase's Avatar
 
elite*gold: 0
Join Date: Sep 2010
Posts: 360
Received Thanks: 138
Question Question about packet analysers / sniffers

Hello.

I have a totally noob question about packet analysers/sniffers for silkroad.

Can they be used on client-end only, for example on private servers for development purposes (programming an auto target), or they only work when using inside the server machine?

I mean cause you gotta specificy the ip/port for proxying the game, is it possible to do it at the client side?
LuigiChase is offline  
Old 07/08/2023, 04:52   #2
 
elite*gold: 0
Join Date: Jan 2009
Posts: 314
Received Thanks: 686
Quote:
Originally Posted by LuigiChase View Post
Hello.

I have a totally noob question about packet analysers/sniffers for silkroad.

Can they be used on client-end only, for example on private servers for development purposes (programming an auto target), or they only work when using inside the server machine?

I mean cause you gotta specificy the ip/port for proxying the game, is it possible to do it at the client side?
Yes, that's where it all started. Filters are just an extension of the proxies we used to sniff and inject packets with. They're made to work with multiple connections instead of a single connection to the host. Now the proxies a built into the bot itself rather than being a separate application like phConnector or nuConnector back in the days.

You'll still need to redirect the client to the on your local machine either by patching using (can't find the binary anymore) or IPInput.
You can also detour on WSAConnect as for example and other loaders are doing with their redirect features.
DaxterSoul is offline  
Thanks
1 User
Old 07/08/2023, 14:38   #3
 
LuigiChase's Avatar
 
elite*gold: 0
Join Date: Sep 2010
Posts: 360
Received Thanks: 138
Quote:
Originally Posted by DaxterSoul View Post
Yes, that's where it all started. Filters are just an extension of the proxies we used to sniff and inject packets with. They're made to work with multiple connections instead of a single connection to the host. Now the proxies a built into the bot itself rather than being a separate application like phConnector or nuConnector back in the days.

You'll still need to redirect the client to the on your local machine either by patching using (can't find the binary anymore) or IPInput.
You can also detour on WSAConnect as for example and other loaders are doing with their redirect features.
Interesting! Thanks for the reply and all the info.

I initially had the question because all the videos I could find of people using sniffers or packet readers was done inside the server.

So let me see if I got it right, the ip/port used on the proxy will be the ones I patch, not the original server ones. Does this work on any pserver?

Thanks mate!
LuigiChase is offline  
Old 07/08/2023, 14:47   #4
 
elite*gold: 0
Join Date: Jan 2009
Posts: 314
Received Thanks: 686
You patch the client to connect to 127.0.0.1 on a port specified by the proxy config and in there you also have to enter the address of the private servers gateway server which you overwrote with the 127.0.0.1.

It might not work on all pservers some employ things that will prevent you from doing these things. As it'll trigger their bot detection.
DaxterSoul is offline  
Thanks
1 User
Reply


Similar Threads Similar Threads
does anyone have the network tools/ packet sniffers?
09/19/2018 - Black Desert - 0 Replies
the stuff on github got DMCA'ed, I was wondering if anyone still got the packet sniffers and can reupload them? I am currently trying to find a way to manipulate the packets (opcode stuff), thanks in advance! https://cdn.discordapp.com/attachments/3221797969 41406208/491531262515740672/unknown.png
Deta Silkroad P-Server(In-Dev) - Looking for developers - Looking for Packet Sniffers
08/14/2011 - SRO Coding Corner - 14 Replies
Deta(In-Dev) Is a TEMP NAME Looking for C# Developers that are experienced not first timers! This is on silkroad ver 1.317 Current Developers: Mage200 ( CrystalCoder) monaiz
Dakaron Packet Sniffers
03/03/2011 - Dekaron - 3 Replies
I havn't played 2moons in a very long time & from the looks of it nobody is going to be leaking private hacks. Is there a public packet sniffer released, i spent a good 2 hours looking & i can't find one.



All times are GMT +1. The time now is 10:39.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.