Jump to content

Recommended Posts

Posted

Hello,

I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet.

My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities.


Init packet(0x00) LoginServer.

Currently in the java Cores I checked there is no decode function for this package, only encript.

Posted (edited)

 

https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md

 

Perhaps you will find it useful

piece of encryption and decryption code from Acis Interlude

 

I transferred these methods to Unity c# and everything works fine

 

https://ibb.co/DHhP0JYr

 

I think the first 2 bytes are the packet size.
Third byte packet id
And then the information itself

 

It's all there in l2j servers

 

Edited by Gawric
Posted
8 hours ago, Gawric said:

 

https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/Descripción general.md

 

Quizás te resulte útil

fragmento de código de cifrado y descifrado de Acis Interlude

 

Transferí estos métodos a Unity C# y todo funciona bien.

 

https://ibb.co/DHhP0JYr

 

Creo que los dos primeros bytes representan el tamaño del paquete.
El tercer byte, el ID del paquete.
Y luego, la información en sí.

 

Todo está ahí en los servidores l2j

 



 

Hello first of all thank you for your prompt response and the time you are taking to read this and answer, I am aware that not everyone takes the time and for that I thank you.


On the other hand the specific problem is when decrypting this package and being able to parse it, 

In some places it says that it is only encrypted with xor, in others that only a static blowfish is used and in others that both are used in the order of xor and then blowfish, this is the problem in spite of being able to see the encryption mechanisms of the servers, I can not put together the function that reverses this encryption to obtain the keys sent by the init packet.

 

Thanks for your time, hopefully the rest can contribute something because it is a super useful module to extend any functionality to the client and I will publish it in an opensource way when it is finished.

Posted (edited)
2 hours ago, rufi said:



 

Hello first of all thank you for your prompt response and the time you are taking to read this and answer, I am aware that not everyone takes the time and for that I thank you.


On the other hand the specific problem is when decrypting this package and being able to parse it, 

In some places it says that it is only encrypted with xor, in others that only a static blowfish is used and in others that both are used in the order of xor and then blowfish, this is the problem in spite of being able to see the encryption mechanisms of the servers, I can not put together the function that reverses this encryption to obtain the keys sent by the init packet.

 

Thanks for your time, hopefully the rest can contribute something because it is a super useful module to extend any functionality to the client and I will publish it in an opensource way when it is finished.

I open the l2j server and see

1. XOR->NewCrypt.encXORPass(raw, offset, size, Rnd.nextInt()); ---> XOR can also be taken from l2j
2. _staticCrypt.crypt(raw, offset, size);
----->
Quote

private void encryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex)
{
    int xl = bytesTo32bits(src, srcIndex);
    int xr = bytesTo32bits(src, srcIndex + 4);
     xl ^= P[0];
    for (int i = 1; i < ROUNDS; i += 2)
    {
      xr ^= func(xl) ^ P[i];
      xl ^= func(xr) ^ P[i + 1];
    }
      xr ^= P[ROUNDS + 1];
      bits32ToBytes(xr, dst, dstIndex);
      bits32ToBytes(xl, dst, dstIndex + 4);
 }

 

 

I scroll down the code and see this code

 

----->

Quote

/**
     * Decrypt the given input starting at the given offset and place the result in the provided buffer starting at the given offset. The input will be an exact multiple of our blocksize.
     * @param src
     * @param srcIndex
     * @param dst
     * @param dstIndex
     */
    private void decryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex)
    {
        int xl = bytesTo32bits(src, srcIndex);
        int xr = bytesTo32bits(src, srcIndex + 4);
        xl ^= P[ROUNDS + 1];
        for (int i = ROUNDS; i > 0; i -= 2)
        {
            xr ^= func(xl) ^ P[i];
            xl ^= func(xr) ^ P[i - 1];
        }
        xr ^= P[0];
        bits32ToBytes(xr, dst, dstIndex);
        bits32ToBytes(xl, dst, dstIndex + 4);
    }

 

===================================================

 

I'm transferring this code to C#

Quote

private void decryptBlock(byte[] src, uint srcIndex, byte[] dst, uint dstIndex)
   {
       uint xl = BytesTo32bits(src, srcIndex);
       uint xr = BytesTo32bits(src, srcIndex + 4);
       xl ^= P[ROUNDS + 1];
       for (int i = ROUNDS; i > 0; i -= 2)
       {
           xr ^= F(xl) ^ P[i];
           xl ^= F(xr) ^ P[i - 1];
       }
       xr ^= P[0];
       Bits32ToBytes(xr, dst, dstIndex);
       Bits32ToBytes(xl, dst, dstIndex + 4);
   }

 

And in c# I first do decryptBlock and then XOR and everything works, I get the package

and the first 2 bytes have already been removed as far as I remember

 

loginXor.png

This only works for the login server.

The blowfish encryption key is used static, it can be found in the l2j server

 

Edited by Gawric

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • Server owners, Top.MaxCheaters.com is now live and accepting Lineage 2 server listings. There is no voting, no rankings manipulation, and no paid advantages. Visibility is clean and equal, and early listings naturally appear at the top while the platform grows. If your server is active, it should already be listed. Submit here https://Top.MaxCheaters.com This platform is part of the MaxCheaters.com network and is being built as a long-term reference point for the Lineage 2 community. — MaxCheaters.com Team
    • ⚙️ General Changed “No Carrier” title to “Disconnected” to avoid confusion after abnormal DC. On-screen Clan War kill notifications will no longer appear during Sieges, Epics, or Events. Bladedancer or SwordSinger classes can now log in even when Max Clients (2) is reached, you cannot have both at the same time. The max is 3 clients. Duels will now be aborted if a monster aggros players during a duel (retail-like behavior). Players can no longer send party requests to blocked players (retail-like). Fixed Researcher Euclie NPC dialogue HTML error. Changed Clan leave/kick penalty from 12 hours to 3 hours. 🧙 Skills Adjusted Decrease Atk. Spd. & Decrease Speed land rates in Varka & FoG. Fixed augmented weapons not getting cooldown when entering Olympiad. 🎉 Events New Team vs Team map added. New Save the King map added (old TvT map). Mounts disabled during Events. Letter Collector Event enabled Monsters drop letters until Feb. 13th Louie the Cat in Giran until Feb. 16th Inventory slots +10 during event period 📜 Quests Fixed “Possessor of a Precious Soul Part 1” rare stuck issue when exceeding max quest items. Fixed Seven Signs applying Strife buff/debuff every Monday until restart. 🏆 Milestones New milestone: “Defeat 700 Monsters in Varka” 🎁 Rewards: 200 Varka’s Mane + Daily Coin 🌍 NEW EXP Bonus Zones Hot Springs added Varka Silenos added (hidden spots excluded) As always, thank you for your support! L2Elixir keeps evolving, improving, and growing every day 💙   Website: https://l2elixir.org/ Discord: https://discord.gg/5ydPHvhbxs
    • https://sms.pro/ — we are an SMS activation platform  seeking partners  mobile number providers  mobile number owners  owners of GSM modems  SIM card owners We process 1,000,000 activations every day.  寻找合作伙伴  手机号码提供商  手机号码持有者  GSM调制解调器持有者  SIM卡持有者 我们每天处理1,000,000次激活。  Ищем партнеров  Владельцы сим карт  провайдеров  владельцев мобильных номеров  владельцев модемов  Обрабатываем от 1 000 000 активаций в день ⚡️ Fast. Reliable.   https://sms.pro/ Support: https://t.me/alismsorg_bot
    • "WHAT I WILL SEE ON NEW SEASON ? *More easy farm and augment than ever before ! *Free VIP characters for everyone for first 2 days after opening ! Improved olympiad engine to work more correctly. 3 New skins / outfits. Fixed raid boss spawns. Fixed olympiad crit errors. New farming Ivory Tower area. Fixed augmentation rate. Increased all mob drops rate by +20%. And much more..."   1. I have clicked VIP 23.01.2026 20:00 a few second after open server. 2 Days is 48h. Now 24.01.2026 I have 17 hours left, so my VIP will expire 08:00 25.01.2026. Where is 12h? SCAM.   2. Where is ivory tower area?   3. When next wipe?   
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..