|
0xFFX packets are internal Silkroad packets specific to the client. What they do is take certain packets received and repost them internally so you can ignore them. They aren't from the loader though, just what Silkroad uses internally to communicate. They only show up because they are "parsed" like normal packets.
For packet analyzing before character selection, you need to use a proxy, like any of my edx33 tools. The auto-parser only shows packets from character selection on (server stats ends up getting parsed in some versions, but that's it). In addition, there are a few limitations to the auto parser when it comes to showing opcodes of the packets that are received in groups as well as opcode only packets
So in short, the auto parser shows you literally how the client parsed a packet. For exact packet ordering and correct opcodes, you have to use a proxy and get the data from there.
|