Jump to content

Adapa

Members
  • Posts

    1
  • Joined

  • Last visited

    Never
  • Donations

    0.00 GBP 

Everything posted by Adapa

  1. In the attempt to improve my skills in C++ and overall as a programmer, I have decided to create a tool that grabs packets from WOW:C, and decrypt them for incoming and outgoing connections. I am testing on 4.2.2(14545(release) AUG 23 2011. I am doing this so I can better understand the protocol of WOW:C and help with the community. I don't know if this is going to be illegal and if it is, you can delete this post. On with the question... I am under the impression that when you first log into WOW:C, you grab the Session Key, and use the TWO HMAC seeds to create the ARC4 charts. That much I know is true, and can do this with ease. The problem I am having is I am also hearing that for any other connection outside of the first WOW:C log-in the server will send you a packet that has two more HMAC seeds that most be used with the Old Session Key to produce another ARC4 chart for decryption on that table. Some people are telling me this packet is: SMSG_AUTH_CHALLENGE, but in my logs, I can not find ANY packet that has the values of SMSG_AUTH_CHALLENGE. So, I am assuming my information is wrong. Does WOW:C just use the first log-in HMAC seeds + Session key to make the ARC4 chart used for all connections, or does the server really send you new HMAC seeds per connection? Or does it send you new Seeds and Session keys for every new connection? Very very confused... Below, I listed my LOG that ends at the Character Selection Screen. If anyone could pint point me to the right packet in the log that holds the HMAC seeds, or the packet I need to use for the new ARC4 charts... it would help me out a lot in understanding the WOW:C Protocol. Thanks!
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy Terms of Use