sure anyone can test things out once they are implemented, i try to keep an actual build running on the server 188.40.48.211:29000
There is still stuff to find out about the enter_world packets before this will work nearly accurate
sure anyone can test things out once they are implemented, i try to keep an actual build running on the server 188.40.48.211:29000
There is still stuff to find out about the enter_world packets before this will work nearly accurate
Hi, how I can help in the development server, not knowing C # or other programming languages?
if the time comes, and the special forum is done, i will post jobs for sniffing and/or analyzing specific packets that are needed for the next development steps
Well, if you do not have time, I can create a forum :)
If I create useful forums/joomla site for the project.
My friend Nikolas, he's one of the bests in Linux and PHP I ever seen. I saw all his jobs, it's very good. If you need, he can help in Linux and PHP area.
the forum is up and running now, AngelEmu Home
I am very interested by the project and join dev team
I have posted on your forum project and if you need more details about me contact me
I can help you out maybe.
I know how the client is written, I know the login HMAC / RC4 key exchange procedures, and can help with some coding and packet sniffing.
I code in Delphi, but I do know assembler and a bit of C#. Just hit me with a pm if you need anything.
Cheers.
Hi Staff, What you using to apply reverse engineering in Perfect World Client? To Protocol I using Wireshark I start try this today, now I will try a Disassembler to client, what tool you are using?
They use their own PacketSniffer ...![]()
Ah!I will check the OllyDbg and test to see I got make, thanx
No need... Wireshark has amazing filtering abilities for things like that...
(ip.src_host == pwisomething.perfectworld.com || ip.dst_host == pwisomething.perfectworld.com) && tcp.port == 29000
I used something similar to figure out what needed to be sent to the server
(ip.src == 192.168.1.10 || ip.dst == 192.168.1.10) && tcp.port == 29000
Yeah, but this wouldn't help ya. Client -> Server traffic is Encrypted by ARC4, and Server -> Client is Encrypted and then Compressed with MPPC (8 kb buffer).
Wireshark on it's own wouldn't tell you anything.
Edit : @EndyBH : I use IDA Pro (make sure you have hex rays dissasm). Alternativle, yes, ollydbg is a good alternative. Heck, even CE's built in debuggers isnt that bad :)
I miss SiCe, but hey, that died with nt systems...
Cheers
Last edited by Swoosh91; 14-03-11 at 04:24 PM.