Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Silkroad Online > SRO Coding Corner
You last visited: Today at 14:46

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[REQUEST]Packet Sniffing tutorial(ANALYZING)

Discussion on [REQUEST]Packet Sniffing tutorial(ANALYZING) within the SRO Coding Corner forum part of the Silkroad Online category.

Reply
 
Old 11/24/2010, 19:38   #16

 
Haxor's Avatar
 
elite*gold: 0
Join Date: Feb 2008
Posts: 3,777
Received Thanks: 1,455
Ok thx lesderd

Now i captured the packets for failed login to enzura server
By edxloader
look
Quote:

[S -> C][0FF1]
01 00 00 00 ................
00 00 00 00 ................

[S -> C][A101]
01 ................
02 ................
14 00 ................
53 69 6C 6B 72 6F 61 64 5F 53 72 65 76 6F 6C 75 Silkroad_Srevolu
74 69 6F 6E tion............
00 ................
01 ................
01 00 ................
06 00 ................
45 6E 7A 75 72 61 Enzura..........
01 00 ................
F4 01 ................
01 ................
00 ................


Failed login

[S -> C][0FF3]
00 00 00 00 ................
09 00 00 00
Is this is it ? Correct
but still dont know when server sends to client and when client sends to server
Haxor is offline  
Old 11/24/2010, 20:10   #17
 
lesderid's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 2,400
Received Thanks: 1,517
AFAIK, 0FF* packets are made by edxLoader and don't exist in the real sro.
If you only need LoginServer documentation, use this:
lesderid is offline  
Old 11/24/2010, 20:40   #18

 
Haxor's Avatar
 
elite*gold: 0
Join Date: Feb 2008
Posts: 3,777
Received Thanks: 1,455
Quote:
Originally Posted by lesderid View Post
AFAIK, 0FF* packets are made by edxLoader and don't exist in the real sro.
If you only need LoginServer documentation, use this:
Its really exist
look at A101
I put the packets of it in the quote and its in loginserver documination

also look
0FF1 is already exist
Quote:
GatewayInfo [2001]
{
[WORD] Length of GatewayServer Name
[STRING] GatewayServer Name //GatewayServer
[BOOL] Server Flag //0x00 is Client connection, 0x01 is Server connection
};
HandShake [5000]
{
NoHandShake
{
[BYTE] 0x01
}
I think you cant really understand what analyzing & sniffing packets well
Haxor is offline  
Old 11/24/2010, 21:27   #19

 
elite*gold: 260
Join Date: Aug 2008
Posts: 560
Received Thanks: 3,779
0xFFX packets are internal Silkroad packets specific to the client. What they do is take certain packets received and repost them internally so you can ignore them. They aren't from the loader though, just what Silkroad uses internally to communicate. They only show up because they are "parsed" like normal packets.

For packet analyzing before character selection, you need to use a proxy, like any of my edx33 tools. The auto-parser only shows packets from character selection on (server stats ends up getting parsed in some versions, but that's it). In addition, there are a few limitations to the auto parser when it comes to showing opcodes of the packets that are received in groups as well as opcode only packets

So in short, the auto parser shows you literally how the client parsed a packet. For exact packet ordering and correct opcodes, you have to use a proxy and get the data from there.
pushedx is offline  
Thanks
2 Users
Old 11/24/2010, 21:30   #20
 
lesderid's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 2,400
Received Thanks: 1,517
This (see pushedx's post) is why I said you should use my documentation for the LoginServer packets.

Thanks for explaining it pushedx, I didn't know the 'story' behind this.
lesderid is offline  
Reply


Similar Threads Similar Threads
[Tutorial] Packets - Sniffing & Analysis
02/07/2018 - Coding Tutorials - 149 Replies
ENGLISH : Packets - Sniffing & Analysis The tutorial was written by me (al_j alias Cholik alias Walter Sobchak) for the elitepvpers-board. Copy it to other boards if you want but please give credits to me and the elitepvpers board. UPDATE] - 082408 - Added another Chapter to the Packet Analysis named "Extended Structure Analysis"
Packet sniffing
06/06/2010 - Atlantica Online - 0 Replies
Anyone tried to capture packets and resend them using wireshark or something?
S4 sniffing hilfe/help
05/06/2010 - General Coding - 15 Replies
Hallo zusammen, ich hab ein problem, und zwar möchte ich Packets von S4 Sniffen und hab auch folgedes TUT durchgelesen und verstanden, aber wenn ich S4 mit dem Bypass aus diesem Tutorial benutze Stoppt Hackshield immer den S4Client Warum? Habe Windows Vista 32bit
ICQ IP Sniffing
04/12/2006 - Main - 14 Replies
Kann mir jemand ein Tool empfehlen oder erklären wie man die IP's von andern ICQusern aus seiner Kontaktliste snifft? Mit WPE krieg ich das net hin ^^



All times are GMT +1. The time now is 14:46.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.