Encryption method, key exchange

Results 1 to 3 of 3
  1. #1
    Registered mike0631 is offline
    MemberRank
    Aug 2013 Join Date
    10Posts

    Encryption method, key exchange

    Encryption method, key exchange
    Removed.
    Last edited by mike0631; 15-10-17 at 04:23 AM.


  2. #2
    Account Upgraded | Title Enabled! jonnybravo is offline
    True MemberRank
    Sep 2006 Join Date
    764Posts

    Re: Encryption method, key exchange

    You aren't gonna be able to figure out the encryption just by looking at the bytes of the packet. You are gonna have to attach a debugger or using IDA and break down the code into something you can read.

    Login packets usually work with some sort of md5 hash or whatever on the password and the username is in plain text with whatever data they add to the login packet structure.

    So in order to crack the encryption use IDA or debugger break point on the client recv function and backtrack backwards using the buffer that is holding the data. More backwards you go you will eventually find the buffer pointer or buffer itself that isn't encrypted and once you do you can then import it to your program language.


    My suggestion is take a smaller packet like a character packet or a chat packet something that has less data in it. Its alot of work but if you have any questions feel free to ask.

  3. #3
    Hardcore Member Scapoot is offline
    MemberRank
    May 2011 Join Date
    139Posts

    Re: Encryption method, key exchange

    Quote Originally Posted by jonnybravo View Post
    You aren't gonna be able to figure out the encryption just by looking at the bytes of the packet. You are gonna have to attach a debugger or using IDA and break down the code into something you can read.

    Login packets usually work with some sort of md5 hash or whatever on the password and the username is in plain text with whatever data they add to the login packet structure.

    So in order to crack the encryption use IDA or debugger break point on the client recv function and backtrack backwards using the buffer that is holding the data. More backwards you go you will eventually find the buffer pointer or buffer itself that isn't encrypted and once you do you can then import it to your program language.


    My suggestion is take a smaller packet like a character packet or a chat packet something that has less data in it. Its alot of work but if you have any questions feel free to ask.
    He's right.

    Although finding the point where it encrypts/decrypts might not be that difficult depending on how old the game is.



Advertisement