Ahhh thanks, I see now. That code is really hard to follow
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: Freundschaft on March 14, 2010, 10:20:13 AM
disassembly of the auth file
Quote from: Freundschaft on March 11, 2010, 07:54:33 PM
i tried messing around a bit with ida.
it seems like we need to have a look at the requestpassword function, which provides a blob response for a blob request sent with the proof request
in code this looks like
sub_3896C9A0 proc near ; DATA XREF: .rdata:3896D080o
.text:3896C9A0 push offset aRequestpasswor ; "RequestPassword"
.text:3896C9A5 mov ecx, offset unk_3896E428
.text:3896C9AA call sub_38962A10
.text:3896C9AF push offset nullsub_3
.text:3896C9B4 call sub_3896C190
.text:3896C9B9 pop ecx
.text:3896C9BA retn
.text:3896C9BA sub_3896C9A0 endp
still have to figure out what this does
Quote from: MADCATX on March 02, 2010, 05:26:31 AMQuote from: waxypants on March 01, 2010, 10:44:45 PMOk, here you go: http://loino.co.cc/upload-files/tmp/sc2serverP.zip (hosting is free and used for other purposes, say me if you can't download the file)
I realize it's just a skeleton now, but would you mind sharing the source?
It's a java project for NetBeans IDE(http://netbeans.org/downloads/index.html). I wasn't able to decrypt the packets, maybe you will succeed.