Jump to content

Recommended Posts

Posted

Welcome to L2PvPserver. Server now it is Beta test Online.

Official start 05.04.2013r.

Website www.l2PvPserver.eu

Forums http://forum.l2pvpserver.eu/

 

Rates:

Exp x5000

Adena x5000

 

Enchant:

safe +3

max armor +12

max weapons +16

Normal Scroll 88%

Blessed scroll 100%

 

Other & Custom Systems:

No Custom Items!

Buff time: 2 hours

Buff slots: 36

Spawn protection 30 second

AntiFeed protection (players with the same IP can't fight eachother)

Olympiad Fully reworked as official, Open: 20:00 - 23:00 +1GMT  everyday, Hero everyweek

Fights messages ex. "You have killed XYZ 5 times."

Max 31 players in one clan, max 2 clan in one ally

Max 1 active and 1 passive augmentation skill

15 kills without die = Hero Aura

Perfect class balance, no overpowers!

Respawn GrandBosses (24h - Valakas, Baium & 12h - Core, Orfen, Frintezza, Zaken, Queen Ant)

Respawn SpecialBosses (every 1 hour)

Pvp/PK rewards

Player with karma have 30% chance for drop items

All subclasses in one npc

All skills enchant in one npc

Announce castle lord login

Pvp/PK color system

Unique Zones

Wedding, Fishing Systems

100% Castle Sieges

Flawless Geodata & PathNodes

 

Special Zones:

- Safe Zone (peace farm for newbies)

- Zone 1 (custom arena zone for PvP)

- Zone 2 (farm zone)

- Zone 3 (nobless zone)

 

 

Items:

- augmentation click Life stone item and cancel augmentation click Gamestone D, C

- noblesse status click item

 

Security:

- DDoS Attack protection

- active machine firewall

- anti bot system, PHX, L2Tower

- several security codes in core server

Guest
This topic is now closed to further replies.


  • Posts

    • I open the l2j server and see 1. XOR->NewCrypt.encXORPass(raw, offset, size, Rnd.nextInt()); ---> xor everything is clear 2. _staticCrypt.crypt(raw, offset, size); -----> private void encryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) { int xl = bytesTo32bits(src, srcIndex); int xr = bytesTo32bits(src, srcIndex + 4); xl ^= P[0]; for (int i = 1; i < ROUNDS; i += 2) { xr ^= func(xl) ^ P[i]; xl ^= func(xr) ^ P[i + 1]; } xr ^= P[ROUNDS + 1]; bits32ToBytes(xr, dst, dstIndex); bits32ToBytes(xl, dst, dstIndex + 4); }   I scroll down the code and see this code   ----->>> /**      * Decrypt the given input starting at the given offset and place the result in the provided buffer starting at the given offset. The input will be an exact multiple of our blocksize.      * @param src      * @param srcIndex      * @param dst      * @param dstIndex      */     private void decryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex)     {         int xl = bytesTo32bits(src, srcIndex);         int xr = bytesTo32bits(src, srcIndex + 4);         xl ^= P[ROUNDS + 1];         for (int i = ROUNDS; i > 0; i -= 2)         {             xr ^= func(xl) ^ P[i];             xl ^= func(xr) ^ P[i - 1];         }         xr ^= P[0];         bits32ToBytes(xr, dst, dstIndex);         bits32ToBytes(xl, dst, dstIndex + 4);     }   ===================================================   I'm transferring this code to C# private void decryptBlock(byte[] src, uint srcIndex, byte[] dst, uint dstIndex)    {        uint xl = BytesTo32bits(src, srcIndex);        uint xr = BytesTo32bits(src, srcIndex + 4);        xl ^= P[ROUNDS + 1];        for (int i = ROUNDS; i > 0; i -= 2)        {            xr ^= F(xl) ^ P[i];            xl ^= F(xr) ^ P[i - 1];        }        xr ^= P[0];        Bits32ToBytes(xr, dst, dstIndex);        Bits32ToBytes(xl, dst, dstIndex + 4);    }   And in c# I first do decryptBlock and then XOR and everything works, I get the package and the first 2 bytes have already been removed as far as I remember   This only works for the login server for the game server, I think it’s not much different  
    • Ask him what you know, and what I know hahaha.
    • https://prnt.sc/2G_hOHfUIGLM   not sure what you mean Teddy boi  
    • Hello first of all thank you for your prompt response and the time you are taking to read this and answer, I am aware that not everyone takes the time and for that I thank you. On the other hand the specific problem is when decrypting this package and being able to parse it,  In some places it says that it is only encrypted with xor, in others that only a static blowfish is used and in others that both are used in the order of xor and then blowfish, this is the problem in spite of being able to see the encryption mechanisms of the servers, I can not put together the function that reverses this encryption to obtain the keys sent by the init packet.   Thanks for your time, hopefully the rest can contribute something because it is a super useful module to extend any functionality to the client and I will publish it in an opensource way when it is finished.
  • Topics

×
×
  • Create New...