Author | Message | Time |
---|---|---|
replaced | How do you get the verifier value? Me using EZBNCS, i cant even find the word verifier on it! I also checked iagos site and i hate doing math | August 3, 2006, 2:14 AM |
HdxBmx27 | EZBNCS does not expose those features. and IIRC BNCSutil.dll dosen't expose that particular function. But it does expose all that is needed to create the account, so you should do it yourself. [code]Public Declare Function nls_init Lib "bncsutil.dll" (ByVal Username As String, ByVal Password As String) As Long 'really returns a POINTER! Public Declare Function nls_init_l Lib "bncsutil.dll" (ByVal Username As String, ByVal Username_Length As Long, ByVal Password As String, ByVal Password_Length As Long) As Long Public Declare Function nls_reinit Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Username As String, ByVal Password As String) As Long Public Declare Function nls_reinit_l Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Username As String, ByVal Username_Length As Long, ByVal Password As String, ByVal Password_Length As Long) As Long Public Declare Sub nls_free Lib "bncsutil.dll" (ByVal NLS As Long) Public Declare Function nls_account_create Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Buffer As String, ByVal BufLen As Long) As Long Public Declare Function nls_account_logon Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Buffer As String, ByVal BufLen As Long) As Long Public Declare Sub nls_get_A Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Out As String) Public Declare Sub nls_get_M1 Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Out As String, ByVal B As String, ByVal Salt As String) Public Declare Function nls_check_M2 Lib "bncsutil.dll" (ByVal NLS As Long, ByVal M2 As String, ByVal B As String, ByVal Salt As String) As Long Public Declare Function nls_check_signature Lib "bncsutil.dll" (ByVal Address As Long, ByVal Signature As String) As Long Public Declare Function nls_account_change_proof Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Buffer As String, ByVal NewPassword As String, ByVal B As String, ByVal Salt As String) As Long 'returns a new NLS pointer for the new password Public Declare Sub nls_get_S Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Out As String, ByVal B As String, ByVal Salt As String) Public Declare Sub nls_get_K Lib "bncsutil.dll" (ByVal NLS As Long, ByVal Out As String, ByVal S As String)[/code] ~-~(HDX)~-~ | August 3, 2006, 4:25 AM |
UserLoser | [quote author=replaced link=topic=15480.msg156437#msg156437 date=1154571242] How do you get the verifier value? Me using EZBNCS, i cant even find the word verifier on it! I also checked iagos site and i hate doing math [/quote] The verifier is the result of the generator to the power of your username & password hash modulo the modulus. The generator is constantly 47, the modulus is a constantly 0xF8FF1A8B619918032186B68CA092B5557E976C78C73212D91216F6658523C787, while the username & password hash is SHA1(Salt, SHA1(Username, ":", Password)). Salt is a 256-bit randomly generated value by the client (you). i.e.: Generator^Hash%Modulus If you don't have a library for big integers, I suggest finding one on google, or writing one your self (would be a fun project), I don't have one handy at the moment. You could also just use bncsutil.dll like HdxBmx suggested. | August 3, 2006, 6:29 AM |
replaced | Yawn, just give me what u would do i vb6, dont give me this 0xF8FF1A8B619918032186B68CA092B5557E976C78C73212D91216F6658523C787.... And how do u make a hash from the username and password?! | August 3, 2006, 3:17 PM |
warz | [quote author=replaced link=topic=15480.msg156453#msg156453 date=1154618241] Yawn, just give me what u would do i vb6, dont give me this 0xF8FF1A8B619918032186B68CA092B5557E976C78C73212D91216F6658523C787.... And how do u make a hash from the username and password?! [/quote] I don't think you understand. He explained your original question in as much detail as youll find anywhere. If you don't understand what is going on here, I suggest using bncsutil and just give up trying to do it on your own. | August 3, 2006, 4:02 PM |
replaced | [quote author=warz link=topic=15480.msg156454#msg156454 date=1154620967] I don't think you understand. He explained your original question in as much detail as youll find anywhere. If you don't understand what is going on here, I suggest using bncsutil and just give up trying to do it on your own. [/quote] I don't think you understand how to create an account, I did not ask for your opinion if I understand how to create a war3 account or not. I am using bncsutil and it has NO documentation what so ever on how to create an account, I can have the bot login existing war3 created accounts but not create new ones. Show the the entire equation to get the verifier value then... Show me how to get the hash of the username and pword through bncsuntil. | August 3, 2006, 6:41 PM |
Myndfyr | [quote author=replaced link=topic=15480.msg156463#msg156463 date=1154630484] Show the the entire equation to get the verifier value then.[/quote] No. We help people who help themselves. http://srp.stanford.edu/ http://www.javaop.com/~iago/SRP.html (Note that this is down presently, and it's documentation of Battle.net's slightly modified SRP. This is also on BnetDocs) http://bnetdocs.valhallalegends.com http://bncsutil.ionws.com Among these four websites you should find *all* the information you need on how to authenticate and create a Warcraft III account. If you have implementation difficulty, post the code that you have or that you've tried and show us the problematic areas that you've had. If you continue to just whine and beg for code I'm going to lock the thread. Show us that you're doing something for yourself before you berate the community for not helping you. | August 3, 2006, 7:08 PM |
replaced | http://bnetdocs.valhallalegends.com/content.php?Section=d&id=18 - does not tell me how to get the Username & Password Hash (x) from the username and password. http://srp.stanford.edu/ -- does not tell me how to get the username and password hash from the username and password. http://bncsutil.ionws.com/ -- Provides no documentation on bncsutil, u can check the website yourself -- source to unzip is in tar / gz, I dont have linux here... http://www.javaop.com/~iago/SRP.html -- the website is down. All I need is the verifier, don't assume that I dont know how to use bncsutil, I already get it to load war3 on accounts already created. I have also checked through the vl forum to see a post to solve my problem and I could not find it, I also searched websites and could not find it. | August 3, 2006, 7:47 PM |
Newby | [quote author=replaced link=topic=15480.msg156468#msg156468 date=1154634476] http://bnetdocs.valhallalegends.com/content.php?Section=d&id=18 - does not tell me how to get the Username & Password Hash (x) from the username and password. http://srp.stanford.edu/ -- does not tell me how to get the username and password hash from the username and password. [/quote] You're an moron. You have no clue how to program, you just want code fed to you so you can copy and paste it and feel satisfaction thinking you wrote a bot. Do you even know where SRP comes into play here? If you don't, you shouldn't be undertaking this project. Please, for everyone's benefit, stop wasting your time and our time. | August 3, 2006, 7:54 PM |
replaced | Still don't want to tell me how to get the hash from the username and password? You don't know? | August 3, 2006, 7:59 PM |
Myndfyr | [quote author=replaced link=topic=15480.msg156468#msg156468 date=1154634476] http://bnetdocs.valhallalegends.com/content.php?Section=d&id=18 - does not tell me how to get the Username & Password Hash (x) from the username and password. [/quote] :o [quote author=BnetDocs] Username & Password Hash (x) x is a value generated by the client based on the username, password, and salt value. In this formula, a comma (,) indicates concatenation: SHA1(s, SHA1(Username, ":", Password)) Username and password are converted to UPPER CASE before hashing. [/quote] As promised, this topic is locked. If you come up with some semblance of ability to read and understand the information that is already available, feel free to post a new topic. | August 3, 2006, 8:10 PM |