wickedliving Posted April 10, 2021 Posted April 10, 2021 Hello,I'm currently working on a couple tools for my server I have been developing over the last few months. One of these tools is a stress test bot that I can't quite figure out the authentication part.My servers encryption works great, but what isn't working is the bot's initial encryption. I believe it has something to do with usually being used to decrypt first, before encrypting. func (c *Xor) Encrypt(dst, src []byte) { for i, v := range src { dst[i] = v ^ 0xAB dst[i] = dst[i]>>4 | dst[i]<<4 dst[i] = dst[i] ^ c.dKey[byte(c.encrypt&0xff)] dst[i] = dst[i] ^ c.dKey[(c.encrypt>>8)+0x100] c.encrypt++ } }So my question is if there is a separate key being used for the client sending message 1051? Quote
wickedliving Posted April 11, 2021 Author Posted April 11, 2021 For future reference of anyone struggling with the same question, CptSky's CO2_CORE_DLL's COCAC is the answer. Quote
Spirited Posted April 12, 2021 Posted April 12, 2021 Yep! Glad you figured it out. Indeed, Conquer Online's custom cipher is asymmetric. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.