Jump to content

blackyale

Members
  • Posts

    5
  • Credits

  • Joined

  • Last visited

  • Feedback

    0%

About blackyale

Profile Information

  • Gender
    Male
  • Country
    Afghanistan

Recent Profile Visitors

547 profile views

blackyale's Achievements

Newbie

Newbie (1/16)

  • Week One Done Rare
  • One Month Later Rare
  • One Year In Rare

Recent Badges

0

Reputation

  1. Hello guys, I haven't give it up in my project of running my custom network bot in a specific server. Today I bring you a capture of network traffic of 2 clients. The first 4 rows are showing my first try to connect to that server with my custom client (which is not working) and the following rows are showing the second try (this time from the l2 client provided by the guys owning the server) which follows the correct login process up to the server selection screen. So if we look at the 3 first rows of each call, they are likely the same length and there’s no errors so it seems that the first steps of the network interaction are ok. The issue is happening on the 4th which is the packet that contains the GameGuard. My question then is: is it possible that they are using a custom gameguard? (originally the l2net was not as big as this one which is 322 bytes long and now I'm only filling with 0s to match the length that this custom server is using) In an affirmative case, is it possible to retrieve that gameguard somewhere? Thanks a lot.
  2. Thanks for your answer. There's no need of using L2J so far, I'm using L2Idle server to test against it with good results (they allow botting so there's no problem with that). I am very curious about the server I mentioned, how can we determine if they are using custom traffic encryption? and next question would be, where is that custom traffic encryption handled, in engine.dll as well?
  3. I'm just trying to port L2Net code from C# to NodeJS and I found a server in which login protocol does not work as expected in similar servers so I guess blowfish might be different but I'm not really sure that's the only thing I'm going to need. (I'm talking about this server http://l2.comunidadzero.com) I think this is what I'm missing after analyzing traffic with Wireshark, after encrypting it with the blowfish key I have different results from my code (which works in other servers with the same protocol version, 268) and the l2.exe client
  4. Hello guys, I'd need to get the blowfish key from a private server, is it stored inside l2.exe or engine.dll? and most important, do you have any idea on how to get it from there? thanks in advance.
  5. Hello guys, I would like to ask for help to bypass or at least identify the anticheat system this server has implemented (http://l2.comunidadzero.com/). It seems to be lameguard but I'm not sure, I tried to sniff l2 packets and I can't even logIn because the first packet is the SetEncription. Otherwise the have some new files like a modified dsetup.dll and system.dll. Any idea? thank u in advance.
×
×
  • Create New...