Hi,
Could anyone help me with the following? (its abstract stuff)
The following knowledge i got already:
War Rock runs its login here:
tcp://server_ip_wr:5330
to login you need to send a package with code 4352 with a timestamp:
TIMESTAMP 4352 10-char-long-RANDOMNUMBER 0 NICKNAME MYRANDOMNUMBERAGAIN NICKNAME ???? 1 0 NP12:auth01:0:MYRANDOMNUMBERAGAIN:SOMERANDOMLONGAU THKEY
What is "????"?
What is the difference between auth01, auth02, auth03 and auth04?
How do i get that SOMERANDOMLONGAUTHKEY
You get the following as return
TIMESTAMP 4352 1 10-char-long-RANDOMNUMBER 0 LOGINNICK MYRANDOMNUMBERAGAIN INGAMENICK 1 0 256103 0 1.1268 -1 INVALID -1 -1 -1 -1 0 -1 2 203 WORLDIP_WORLD 5340 2576 0 204 WEST IP_WEST 5340 106 0
What is the 1.1268 ? Is it a random number too (from 1-3 with 4 digits after decimal point?) Is it connected with, where I want to connect to?
thats right?
To crypt the packages and send them to the server I need xOR with key 0xC3?
Okay after that im logged in, right? I need to send data to tcp//wr_serv_ip:5340 now?
Also I need to send every 5 seconds a im_alive_check with style: "packet_alive_code TIMESTAMP"
I can send data from the userlist by adressing a packet code like that:
"packet_userlist_code TIMESTAMP (1: Nickname, 2: Clan, 3: Levelrange) VALUE" (i think its that style?)
How and where do I get data now returned?
Would be cool if you could help me :-)
Addition: Nexon seems to use that auth01 stuff as cookie on their website too. I need to logon warrock eu and post that authkey in the loginpacket ?






