Jump to content

Recommended Posts

Posted

It may be a well-known exploit.. if it is please delete this topic or do whatever you want..

so with this you can get xxxxxxxxxxxxx M. atk/P.atk/cast.spd etc..

you need a server with a low(-20) buff limit

and first thing to do is to ask an SE, prophet, Over, Dancer 2 help you

Do this with no buffs on you!

(m.atk+cast.spd) you get an empower and acumen and berz for the first 3 slots

and you fill the other slots with the buffs you want.. so there are no more slots.. the next buff is a rage of paagrio which knocks out empower but empower is still empowering you :D the next 2 buffs are your choices.. and now another empower and acumen

after 20 mins..

The effect of Empower has worn off.

The effect of Acumen has worn off.

But you can still see it and it is still on you..

Your speed, cast.spd, M.atk is increased a bit if you did it well..

do this again as much as you want.. ^^

here are some screenies.. (i didnt find the screenshot which shows my stats.. 80kk M.atk 34k Cast. spd, 452 spd )

311224937Shot00007_www.kepfeltoltes.hu_.jpg

1.

you can see the hurricane's effect.. i couldn't use it because i didnt have mp, but you can still see the casting effect, because of the high cast.spd(no cooldown:D)

311224937Shot00007_www.kepfeltoltes.hu_.jpg

2.

:)

 

I did it on a L2j C5 Server.. but when the GM-s realized it they banned the whole Alliance..^^

here's the last screenie

311224937Shot00007_www.kepfeltoltes.hu_.jpg

Antharas with 0 speed ^^

Posted

A.A.A. !!

 

Please Change Hoster For your Screens..Cuz that You have Now simply : SUX !!

Guest
This topic is now closed to further replies.



  • Posts

    • I open the l2j server and see 1. XOR->NewCrypt.encXORPass(raw, offset, size, Rnd.nextInt()); ---> xor everything is clear 2. _staticCrypt.crypt(raw, offset, size); -----> private void encryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) { int xl = bytesTo32bits(src, srcIndex); int xr = bytesTo32bits(src, srcIndex + 4); xl ^= P[0]; for (int i = 1; i < ROUNDS; i += 2) { xr ^= func(xl) ^ P[i]; xl ^= func(xr) ^ P[i + 1]; } xr ^= P[ROUNDS + 1]; bits32ToBytes(xr, dst, dstIndex); bits32ToBytes(xl, dst, dstIndex + 4); }   I scroll down the code and see this code   ----->>> /**      * Decrypt the given input starting at the given offset and place the result in the provided buffer starting at the given offset. The input will be an exact multiple of our blocksize.      * @param src      * @param srcIndex      * @param dst      * @param dstIndex      */     private void decryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex)     {         int xl = bytesTo32bits(src, srcIndex);         int xr = bytesTo32bits(src, srcIndex + 4);         xl ^= P[ROUNDS + 1];         for (int i = ROUNDS; i > 0; i -= 2)         {             xr ^= func(xl) ^ P[i];             xl ^= func(xr) ^ P[i - 1];         }         xr ^= P[0];         bits32ToBytes(xr, dst, dstIndex);         bits32ToBytes(xl, dst, dstIndex + 4);     }   ===================================================   I'm transferring this code to C# private void decryptBlock(byte[] src, uint srcIndex, byte[] dst, uint dstIndex)    {        uint xl = BytesTo32bits(src, srcIndex);        uint xr = BytesTo32bits(src, srcIndex + 4);        xl ^= P[ROUNDS + 1];        for (int i = ROUNDS; i > 0; i -= 2)        {            xr ^= F(xl) ^ P[i];            xl ^= F(xr) ^ P[i - 1];        }        xr ^= P[0];        Bits32ToBytes(xr, dst, dstIndex);        Bits32ToBytes(xl, dst, dstIndex + 4);    }   And in c# I first do decryptBlock and then XOR and everything works, I get the package and the first 2 bytes have already been removed as far as I remember   This only works for the login server for the game server, I think it’s not much different  
    • Ask him what you know, and what I know hahaha.
    • https://prnt.sc/2G_hOHfUIGLM   not sure what you mean Teddy boi  
    • Hello first of all thank you for your prompt response and the time you are taking to read this and answer, I am aware that not everyone takes the time and for that I thank you. On the other hand the specific problem is when decrypting this package and being able to parse it,  In some places it says that it is only encrypted with xor, in others that only a static blowfish is used and in others that both are used in the order of xor and then blowfish, this is the problem in spite of being able to see the encryption mechanisms of the servers, I can not put together the function that reverses this encryption to obtain the keys sent by the init packet.   Thanks for your time, hopefully the rest can contribute something because it is a super useful module to extend any functionality to the client and I will publish it in an opensource way when it is finished.
  • Topics

×
×
  • Create New...