Register for your free account! | Forgot your password?

Go Back   elitepvpers > Shooter > WarRock
You last visited: Today at 06:01

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



Warrock XOR Keys

Discussion on Warrock XOR Keys within the WarRock forum part of the Shooter category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Warrock XOR Keys

Where can I find the latest warrock XOR Keys? Do I need to use WireShark? Any info would be great, thanks!
SosaMan is offline  
Old 03/12/2022, 21:05   #2
 
elite*gold: 0
Join Date: Nov 2021
Posts: 36
Received Thanks: 0
Xor means if you know the original key, you can get the latest key. Just xor the last received byte with 0x0A and you'll get the xor key of that specific packet.
qhuongli is offline  
Old 03/12/2022, 22:25   #3
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Quote:
Originally Posted by qhuongli View Post
Xor means if you know the original key, you can get the latest key. Just xor the last received byte with 0x0A and you'll get the xor key of that specific packet.
Could you perhaps explain with a simple example? Like what exactly is the last byte of the packet, and how do you xor it with 0x0A ( i find basic xor encryption/decryption but not specifically what u say)

Taiga on *forum* explained it like this:
Quote:
byte xorKey = packetBuffer[packteBuffer.Length -1] ^ 0x0A;
However i don't exactly know how to work this out in practise.

Thanks!
SosaMan is offline  
Old 03/12/2022, 22:50   #4
 
elite*gold: 0
Join Date: Nov 2021
Posts: 36
Received Thanks: 0
The WarRock packet structure is a string that is encrypted by a XOR cipher but since private servers where created nonstop they are forced to changed the structure. The As we know, keys are always the same for the login server. But in the newer versions of WarRock the keys of the game server change every update.

The packet it self is a string that has been all the data concatenated by a character. Every packet ends with an end line character (0xA). You should decoded the packet immediately when you receive any data and split them by the end line character Once you have made that you can parse the packet by separating them into blocks by splitting the packet on it's spaces.

An example packet send by the server to the launcher:
1234567 4112 0 25 40 100 0 0

The first data block is the time stamp of the packet, this one is used to indicate when the packet was sent by the client. The value of this packet is the amount of ticks since the computer has been started.

1234567 4112 0 25 40 100 0 0
The second block indicates the packet (ID) to tell the server what the rest of the data is. Packets can only contain an ID to ask the server for a certain response. It's easier to remember the packet IDs if you convert them to hexadecimal.

1234567 4112 0 25 40 100 0 0

All the other data blocks are data for the client or server.
1234567 4112 0 25 40 100 0 0
Start of a new connection

Every connection of all the servers start with a basic handshake. The server sends out the packet 4608(0x1200) with a random integer that has a length of 8 numbers as data block. The client responds with it's next packet after this packet was received.

I'll remove the time stamp from the packets since it isn't important and makes it easier to read the packets.

4608 50039730

Hope it helps.
qhuongli is offline  
Old 03/12/2022, 23:57   #5
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Quote:
Originally Posted by qhuongli View Post
The WarRock packet structure is a string that is encrypted by a XOR cipher but since private servers where created nonstop they are forced to changed the structure. The As we know, keys are always the same for the login server. But in the newer versions of WarRock the keys of the game server change every update.

The packet it self is a string that has been all the data concatenated by a character. Every packet ends with an end line character (0xA). You should decoded the packet immediately when you receive any data and split them by the end line character Once you have made that you can parse the packet by separating them into blocks by splitting the packet on it's spaces.

An example packet send by the server to the launcher:
1234567 4112 0 25 40 100 0 0

The first data block is the time stamp of the packet, this one is used to indicate when the packet was sent by the client. The value of this packet is the amount of ticks since the computer has been started.

1234567 4112 0 25 40 100 0 0
The second block indicates the packet (ID) to tell the server what the rest of the data is. Packets can only contain an ID to ask the server for a certain response. It's easier to remember the packet IDs if you convert them to hexadecimal.

1234567 4112 0 25 40 100 0 0

All the other data blocks are data for the client or server.
1234567 4112 0 25 40 100 0 0
Start of a new connection

Every connection of all the servers start with a basic handshake. The server sends out the packet 4608(0x1200) with a random integer that has a length of 8 numbers as data block. The client responds with it's next packet after this packet was received.

I'll remove the time stamp from the packets since it isn't important and makes it easier to read the packets.

4608 50039730

Hope it helps.
Thank you very much for your detailed explaination, I will try to get a better understanding. We'll have a chat if you don't mind
SosaMan is offline  
Thanks
1 User
Old 03/13/2022, 02:05   #6
 
elite*gold: 0
Join Date: Nov 2021
Posts: 36
Received Thanks: 0
Beware of this guy. You have been warned!
qhuongli is offline  
Old 03/13/2022, 10:10   #7
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Unhappy

Quote:
Originally Posted by qhuongli View Post
Beware of this guy. You have been warned!

I asked this guy for some proof of his work. Tries to ask me 50% in front without showing 1 working tool.

If i want to buy something from any of you I need to see some kind of working demo (through screenshare for example).
SosaMan is offline  
Old 03/13/2022, 14:04   #8
 
elite*gold: 0
Join Date: Mar 2014
Posts: 132
Received Thanks: 100
Quote:
Originally Posted by SosaMan View Post
Where can I find the latest warrock XOR Keys? Do I need to use WireShark? Any info would be great, thanks!

Actually, the packets on Port 10375 are not encrypted.
So you dont need any XOR-Key for them.
lllllllillllllllll is offline  
Old 03/13/2022, 17:42   #9
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Quote:
Originally Posted by lllllllillllllllll View Post
Actually, the packets on Port 10375 are not encrypted.
So you dont need any XOR-Key for them.
I tried using the WR packet sniffer by phantom (i think) created back in 2014 and it only shows login server packets (as that xor key doesn't change) it also allows me to enter 2 xor keys for the game server (with the current xor keys its holding it does not work)

When using wireshark i can only see encrypted packets (as far as I know)

Could you ellaborate on how to sniff those game server packets?
SosaMan is offline  
Old 03/14/2022, 21:19   #10
 
elite*gold: 0
Join Date: Nov 2020
Posts: 134
Received Thanks: 40
are decrypted all packets with wireshark, use HxD to read it better them

here an example to a packet to create room khali 32 players bighead ghosts
DE 64 00 00 00 73 05 00 45 56 45 4E 54 00 00 00 00 04 00 4E 55 4C 4C 04 00 00 00 17 00 00 00 00 00 00 00 FF FF FF FF 03 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ED
bigheadwr is offline  
Old 03/15/2022, 19:54   #11
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Quote:
Originally Posted by bigheadwr View Post
are decrypted all packets with wireshark, use HxD to read it better them

here an example to a packet to create room khali 32 players bighead ghosts
DE 64 00 00 00 73 05 00 45 56 45 4E 54 00 00 00 00 04 00 4E 55 4C 4C 04 00 00 00 17 00 00 00 00 00 00 00 FF FF FF FF 03 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ED
HxD editor gives me the same output as wireshark (in text ). only publicly stuff like room names and usernames are visible but other stuff looks encrypted to me
SosaMan is offline  
Old 05/07/2022, 11:35   #12
 
elite*gold: 0
Join Date: Mar 2014
Posts: 132
Received Thanks: 100
Quote:
Originally Posted by SosaMan View Post
HxD editor gives me the same output as wireshark (in text ). only publicly stuff like room names and usernames are visible but other stuff looks encrypted to me
its not, you just dont know how to read it i guess^^

Its binary... so read it in HEX.

Also notice its little endian not big endian..
lllllllillllllllll is offline  
Thanks
1 User
Old 05/10/2022, 21:27   #13
 
elite*gold: 0
Join Date: Nov 2020
Posts: 134
Received Thanks: 40
yup
bigheadwr is offline  
Old 05/21/2022, 19:15   #14
 
elite*gold: 0
Join Date: Mar 2016
Posts: 67
Received Thanks: 2
Quote:
Originally Posted by lllllllillllllllll View Post
its not, you just dont know how to read it i guess^^

Its binary... so read it in HEX.

Also notice its little endian not big endian..
Can you explain reading it in HEX?
Like, in the end there's a way to get a text result right?
I tried XOR'ing the last byte with 0x0A and i got 237 as a result. tried to use this to decrypt the whole packet but that did not work ( useless result )

Could you perhaps use one packet as an example and decrypt it? that would be great.
SosaMan is offline  
Old 05/25/2022, 18:22   #15
 
elite*gold: 0
Join Date: May 2022
Posts: 2
Received Thanks: 1
My old account is gone... somehow i cannot post images


Warrock received an update on its networking a couple of months ago. It only applies to the gameservers, as far as i know, the loginserver xor has not been changed (and still is 0x96 for sending 0xC3 receiving).

Warrock switched from ASCII 'blocks' to using serialized network packets. The content of the data, the order of the blocks, and the type of packets they used to send are still the same. Instead, 'raw' bytes are now sent, and not the ASCII representation.

An example:

I know this packet has id `24823` -> hex: `0x6100` aka le `00 61`


Timestamp (green) + packetid (red)


With some knowledge about the content of the packets (which you can learn from opensource private servers), the full packet can be reconstructed, and created to send a response:



Random tool build to easy decode packets

Clientless Bots
I have built a clientless bot or two for warrock, recently I have tried to 'update' it for fun. To quickly get started I have used the structs library in python to 'decode' the packets. Interpret them and send responses, all work fine... until you get kicked by the lack of a anticheat-heartbeat....

However, if someone knows a trick to delay the anticheat-heartbeat, a clientless bot can still be possible. Creating/joining a room (private with two bots, don't wanna bother anyone), starting, running and leaving the server, could be done easily with < 20/30s.

I would be interested in trading working Invisible cheat code (nothing fancy, just serverpointer+magicoffset = magicvalue) for a trick/bug to delay the anticheat-heartbeat kick


Quick and dirty script emulating packets
DroomOne is offline  
Thanks
1 User
Reply


Similar Threads Similar Threads
Aktuelle Server XOR Cryption keys?
03/27/2013 - WarRock - 8 Replies
Moin, weiß jemand wie die aktuellen (seit NEXON) Crypten/EnCryption XOR keys sind? Geht vor allem an die Private-Server Hoster, die sollten sowas wissen :D Danke
some Xor keys and magickeys.
01/13/2013 - Cabal Private Server - 14 Replies
EGCabal Xor Keys http://www.elitepvpers.com/forum/cabal-hacks-bots- cheats-exploits-macros/2164612-release-eg-cabal-by pass.html (shit security) Magickey: 003c6a55 1. 83 2. 25 3. 67 4. 51 Serenity Cabal Xor Keys (Sry no more bypass its private now)
Xor Rohan Bot V1 First Bot For Xor Ever!!
06/11/2012 - Rohan - 13 Replies
xorrohan-bot.blogspot.com/ This Is The Site That Will Make Your Life Easer!!! Look There Is A Scan Download Picture!! Every Thing Check It Out!! Fast!!!!!!!!!!!!!!!!! The Only Xor Rohan Bot Came Up Now!!!! Its 100% Clear!!
[How to] Find the XOR keys in cabalmain.exe
04/24/2012 - Cabal Private Server - 5 Replies
So I made a little tut on how to find the XOR keys in the cabalmain incase some dev decides to change them. They are located at 0042D470 83F0 57 XOR EAX,57 // XOR 4 0042D482 83F0 67 XOR EAX,67 // XOR 3 0042D494 83F0 65 XOR EAX,65 // XOR 2
About xor keys!!!
09/05/2010 - Cabal Private Server - 12 Replies
How i can find xor keys from a .enc file even if theyre are changed? :handsdown:



All times are GMT +1. The time now is 06:01.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.