Welcome!

Join our community of MMO enthusiasts and game developers! By registering, you'll gain access to discussions on the latest developments in MMO server files and collaborate with like-minded individuals. Join us today and unlock the potential of MMO server development!

Join Today!

Reversing packets for an Emulator

Moderator
Staff member
Moderator
Joined
Jan 13, 2013
Messages
1,186
Reaction score
360
Hello there so I am no professional with Reverse Engineering and require a little assistance with figuring out one of these packets as It has came out of the random during the emulator test runs and was wondering If anyone can help me with working It out?

Code:
0A 00 34 04 00 00 00 00 36 1A 06 00 64 09 3A 1A     ..4.....6...d.:.
2E 1A 00 00 00 00 00 00 00 00 00 00 00 00 00 00     ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00     ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00     ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00     ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00     ................
 
Moderator
Staff member
Moderator
Joined
Jan 13, 2013
Messages
1,186
Reaction score
360
It's In game server side related to an emulator but apart from that then I don't think I have enough info to inform you of anything more to have you guys contribute something that can help.
 
[emoji848]
Legend
Joined
Dec 3, 2011
Messages
2,232
Reaction score
1,518
Repeating what I said on discord for the rest of the people:

Get a Hex editor that is capable of applying data structures at the memory dump. It looks like a bunch of integers with various lengths, 8,16,32 bit. Format them and see which values make sense in your case.

I recall or being pretty good at that.

On a side note: The packets might be encrypted if you intercept them with WireShark or similar
 
Back
Top