Author | Message | Time |
---|---|---|
AC_Drkan | Ok on the greet bots when they connect they send packets (0x03)c and (0x04)d Change them to.....? 0x1 to be a blizzrep? | May 10, 2004, 3:21 PM |
LoRd | [quote author=AC_Drkan link=board=17;threadid=6734;start=0#msg59344 date=1084202518] Ok on the greet bots when they connect they send packets (0x03)c and (0x04)d Change them to.....? 0x1 to be a blizzrep? [/quote] ... The first packet would be the protocol ID. Sending 0x03 as the protocol ID would tell the server that you're connecting as a CHAT client and restrict you to public channels, but if you were to change it to 0x01, you'd be telling the server that you're connecting as a binary client which would allow you to enter most of Battle.net's channels, but would also require lots of authentication. | May 10, 2004, 3:26 PM |
ChR0NiC | And I know you didn't mention this, but 0x02 would be FTP. Edit: In order to become a Blizzard Rep, BNET would have to assign your specific account with a flags of &H1. Which is the same thing they do for GF_PLAYER except they assign the account a flags of &H200000. | May 10, 2004, 4:25 PM |
Myndfyr | [quote author=ChR0NiC link=board=17;threadid=6734;start=0#msg59356 date=1084206349] And I know you didn't mention this, but 0x02 would be FTP. Edit: In order to become a Blizzard Rep, BNET would have to assign your specific account with a flags of &H1. Which is the same thing they do for GF_PLAYER except they assign the account a flags of &H200000. [/quote] Which means it's pretty much the same thing, only different? ^_^ | May 10, 2004, 4:58 PM |
Eli_1 | On a side note, 0x04 tells the server you don't want it to echo back what you send. | May 10, 2004, 6:29 PM |
AC_Drkan | I've tried 0x02 which is a channel ops and it connected but then disconnected in like 10 minutes Then i tried 0x40 and that was a special guest which was pretty stable and maittained a connection for about 30 minutes. Pretty cool, i was able to access my op's channel wiht the bot but i accidently had the greet message on my stealth and it sorta flooded it out. | May 11, 2004, 9:39 AM |
AC_Drkan | [quote author=LoRd[nK] link=board=17;threadid=6734;start=0#msg59347 date=1084202816] [quote author=AC_Drkan link=board=17;threadid=6734;start=0#msg59344 date=1084202518] Ok on the greet bots when they connect they send packets (0x03)c and (0x04)d Change them to.....? 0x1 to be a blizzrep? [/quote] ... The first packet would be the protocol ID. Sending 0x03 as the protocol ID would tell the server that you're connecting as a CHAT client and restrict you to public channels, but if you were to change it to 0x01, you'd be telling the server that you're connecting as a binary client which would allow you to enter most of Battle.net's channels, but would also require lots of authentication. [/quote] Authenticiation? What types?? | May 11, 2004, 3:08 PM |
ChR0NiC | First of all, try not to post two or more in a row, just use the modify button located in the top right of your current post. [quote author=AC_Drkan link=board=17;threadid=6734;start=0#msg59534 date=1084288114] Authenticiation? What types?? [/quote] Logon Sequence For 0x50: (Compatible With Every Client, except Chat) [code] SEND -> Protocol byte (01) SEND -> SID_AUTH_INFO (0x50) RECV <- SID_PING (0x25) RECV <- SID_AUTH_INFO (0x50) SEND -> SID_PING (0x25) [Optional] SEND -> SID_AUTH_CHECK (0x51) RECV <- SID_AUTH_CHECK (0x51) SEND -> SID_LOGONRESPONSE (0x29) RECV <- SID_LOGONRESPONSE (0x29) [Instead of 0x29, you may use 0x3A] SEND -> SID_LOGONRESPONSE2 (0x3A) RECV -> SID_LOGONRESPONSE2 (0x3A) [/0x3A] SEND -> SID_UDPPINGRESPONSE (0x14) [Game Specific: SEXP/STAR/W2BN] SEND -> SID_ENTERCHAT (0x0A) [/code] Logon Sequence For 0x1E (Applies to but not limited to D1 and W2) [code] Warcraft 2 BNE (W2BN) SEND -> Protocol byte (01) SEND -> SID_CLIENTID2 (0x1E) SEND -> SID_LOCALEINFO (0x12) SEND -> SID_STARTVERSIONING (0x06) RECV <- SID_LOGONCHALLENGEEX (0x1D) RECV <- SID_PING (0x25) RECV <- SID_STARTVERSIONING (0x06) SEND -> SID_PING (0x25) [Optional] SEND -> SID_REPORTVERSION (0x07) RECV <- SID_REPORTVERSION (0x07) SEND -> SID_UDPPINGRESPONSE (0x14) [Optional] SEND -> SID_CDKEY2 (0x36) RECV <- SID_CDKEY2 (0x36) SEND -> SID_LOGONRESPONSE (0x29) RECV <- SID_LOGONRESPONSE (0x29) SEND -> SID_ENTERCHAT (0x0A) [/code] Edit: Packet structures for each of these packets are available at BNET Docs | May 11, 2004, 5:09 PM |