Author | Message | Time |
---|---|---|
OriOn | Anybody has an idea about the use of the 128 bytes signature in the 0x50 packet ? | December 18, 2003, 3:55 AM |
Skywing | [quote author=OriOn link=board=17;threadid=4320;start=0#msg36137 date=1071719758] Anybody has an idea about the use of the 128 bytes signature in the 0x50 packet ? [/quote] http://www.valhallalegends.com/yoni/BNLSProtocolSpec.txt [quote]BNLS_VERIFYSERVER (0x11) ------------------------ This messages verifies a server's signature, which is based on the server's IP. The signature is optional (currently sent only with Warcraft 3), and is sent in SID_AUTH_INFO (0x50). (DWORD) Server's IP. (128 bytes) Signature. Response: --------- (BOOL) Success. (If this is TRUE, the signature matches the server's IP - if this is FALSE, it does not.)[/quote] | December 18, 2003, 4:09 AM |
OriOn | Yes, i have read this document. But i try to understand the processus of the NLS. I already have reverse the cdkey hash and i want to understand the login process. | December 18, 2003, 1:59 PM |
iago | Then, reverse this? | December 18, 2003, 2:03 PM |
Soul Taker | [quote author=iago link=board=17;threadid=4320;start=0#msg36168 date=1071756229] Then, reverse this? [/quote] ?siht esrever ,nehT | December 18, 2003, 7:56 PM |
UserLoser. | [quote author=Soul Taker link=board=17;threadid=4320;start=0#msg36224 date=1071777395] [quote author=iago link=board=17;threadid=4320;start=0#msg36168 date=1071756229] Then, reverse this? [/quote] ?siht esrever ,nehT [/quote] No, you're supposed to reverse this, not that :P siht | December 18, 2003, 11:19 PM |