Jump to content
Ind

Hercules WPE Free - June 14th Patch

Recommended Posts

what is the best client to use that can take advantage of this feature ?

 

I want to use a client that supports Rebellion Class as well and stable as much as possible

 

Any suggestions ... please

2013-12-23cRagexe

Share this post


Link to post
Share on other sites

If guys search for a "not broken" client, check the list behind (each encryption tested 10 000 000 times), seems like Gravity doesn't even take time to find correct keys :

 

20110817 - PASSED
20110824 - FAILED x32
20110831 - PASSED
20110906 - PASSED
20111005 - FAILED x29
20111012 - FAILED x32
20111021 - PASSED
20111025 - PASSED
20111102 - FAILED x31
20111109 - FAILED x16
20111122 - FAILED x16
20111207 - FAILED x31
20111214 - FAILED x32
20111220 - FAILED x16
20111228 - FAILED x7
20120104 - PASSED
20120111 - PASSED
20120120 - PASSED
20120202 - PASSED
20120207 - PASSED
20120214 - FAILED x31
20120229 - PASSED
20120307 - FAILED x31
20120314 - PASSED
20120321 - PASSED
20120328 - FAILED x32
20120404 - PASSED
20120410 - FAILED x32
20120418 - FAILED x15
20120424 - FAILED x11
20120509 - PASSED
20120515 - PASSED
20120525 - FAILED x16
20120605 - PASSED
20120612 - FAILED x14
20120618 - PASSED
20120702 - PASSED
20120716 - PASSED
20130320 - FAILED x32
20130514 - PASSED
20130522 - PASSED
20130529 - FAILED x30
20130605 - PASSED
20130612 - PASSED
20130618 - PASSED
20130626 - FAILED x11
20130703 - FAILED x32
20130807 - FAILED x4
20131218 - FAILED x31
20131223 - FAILED x14
20131230 - PASSED

Share this post


Link to post
Share on other sites

 

If guys search for a "not broken" client, check the list behind (each encryption tested 10 000 000 times), seems like Gravity doesn't even take time to find correct keys :

 

20110817 - PASSED
20110824 - FAILED x32
20110831 - PASSED
20110906 - PASSED
20111005 - FAILED x29
20111012 - FAILED x32
20111021 - PASSED
20111025 - PASSED
20111102 - FAILED x31
20111109 - FAILED x16
20111122 - FAILED x16
20111207 - FAILED x31
20111214 - FAILED x32
20111220 - FAILED x16
20111228 - FAILED x7
20120104 - PASSED
20120111 - PASSED
20120120 - PASSED
20120202 - PASSED
20120207 - PASSED
20120214 - FAILED x31
20120229 - PASSED
20120307 - FAILED x31
20120314 - PASSED
20120321 - PASSED
20120328 - FAILED x32
20120404 - PASSED
20120410 - FAILED x32
20120418 - FAILED x15
20120424 - FAILED x11
20120509 - PASSED
20120515 - PASSED
20120525 - FAILED x16
20120605 - PASSED
20120612 - FAILED x14
20120618 - PASSED
20120702 - PASSED
20120716 - PASSED
20130320 - FAILED x32
20130514 - PASSED
20130522 - PASSED
20130529 - FAILED x30
20130605 - PASSED
20130612 - PASSED
20130618 - PASSED
20130626 - FAILED x11
20130703 - FAILED x32
20130807 - FAILED x4
20131218 - FAILED x31
20131223 - FAILED x14
20131230 - PASSED

 

so this one >>> 20131223 - FAILED x14  <<< cannot use this anti wpe feature ?

 

does rPE and wPE works the same though ?

Share this post


Link to post
Share on other sites

so this one >>> 20131223 - FAILED x14  <<< cannot use this anti wpe feature ?

 

does rPE and wPE works the same though ?

It's working for the 14 first packet received from the client, after the encryption will not be update and it's possible to use WPE/RPE.

And yeah WPE/RPE are the same (talking about this update).

Share this post


Link to post
Share on other sites

 

so this one >>> 20131223 - FAILED x14  <<< cannot use this anti wpe feature ?

 

does rPE and wPE works the same though ?

It's working for the 14 first packet received from the client, after the encryption will not be update and it's possible to use WPE/RPE.

And yeah WPE/RPE are the same (talking about this update).

 

oh my ... that breaks my heart ... only way to fix this is to go to 20131230 ?

Share this post


Link to post
Share on other sites

oh my ... that breaks my heart ... only way to fix this is to go to 20131230 ?

Or just update the client keys (already explained some pages before).

Share this post


Link to post
Share on other sites

 

oh my ... that breaks my heart ... only way to fix this is to go to 20131230 ?

Or just update the client keys (already explained some pages before).

 

Do you mind if you make a complete guide of that? Because there isnt a lot of information. I tried to do it but I had to give up because of the same.

Share this post


Link to post
Share on other sites

 

oh my ... that breaks my heart ... only way to fix this is to go to 20131230 ?

Or just update the client keys (already explained some pages before).

 

yeah can you please create a complete key for 2031223 please ?

 

also when are you planning to release your guitar hero script here in hercules ? If I remember it right you had one before

Share this post


Link to post
Share on other sites

Do you mind if you make a complete guide of that? Because there isnt a lot of information. I tried to do it but I had to give up because of the same.

If you're using NEMO v.2.0 or newer, it's pretty easy to do it when hexing your client. Just enable the three "Packet __ Key Encryption" patches, and input the desired values.

 

 

Then edit your src/map/packets.h, adding a line like this near the end of your file (replacing FIRSTKEY, SECONDKEY and THIRDKEY as appropriate):

// Add me before the '#endif /* _MAP_PACKETS_H */' linepacketKeys(0xFIRSTKEY,0xSECONDKEY,0xTHIRDKEY);
Altermatively, if you don't want to edit source files, and you're compiling through ./configure and make, you can use the following (again, replace with your actual keys):
./configure --with-key1=0xFIRSTKEY --with-key2=0xSECONDKEY --with-key3=0xTHIRDKEY

Share this post


Link to post
Share on other sites

 

Do you mind if you make a complete guide of that? Because there isnt a lot of information. I tried to do it but I had to give up because of the same.

If you're using NEMO v.2.0 or newer, it's pretty easy to do it when hexing your client. Just enable the three "Packet __ Key Encryption" patches, and input the desired values.

 

 

Then edit your src/map/packets.h, adding a line like this near the end of your file (replacing FIRSTKEY, SECONDKEY and THIRDKEY as appropriate):

// Add me before the '#endif /* _MAP_PACKETS_H */' linepacketKeys(0xFIRSTKEY,0xSECONDKEY,0xTHIRDKEY);
Altermatively, if you don't want to edit source files, and you're compiling through ./configure and make, you can use the following (again, replace with your actual keys):
./configure --with-key1=0xFIRSTKEY --with-key2=0xSECONDKEY --with-key3=0xTHIRDKEY

 

I see, my doubts are:  what keys do I have to put in?  Do I have to make up those keys?  Do I have to use three different ones?

Share this post


Link to post
Share on other sites

I see, my doubts are:  what keys do I have to put in?  Do I have to make up those keys?  Do I have to use three different ones?

what keys do I have to put in?

 

If you don't want to make them up, you can use the keys from any working client (you can find them in src/map/packets.h). Refer to the list posted by KeyWorld to know which ones can be safely used.

 

Do I have to make up those keys?

 

Possibly not. Generate your own keys only if (1) you know exactly how the algorithm works; (2) you are not Gravity; (3) you know how to generate strong keys.

I do not have any recommendations, as I don't have an algorithm to generate strong keys. I'm only able to recognize some classes of weak keys, but some keys I consider strong, may have other weaknesses. Just use keys from other client versions, since both I and KeyWorld have tested them with over 10 million iterations.

 

Do I have to use three different ones?

 

This is not strictly necessary.

Share this post


Link to post
Share on other sites

How about this client 2014-01-15? 

@offtopic Isn't that client unstable? I see there's many random crash with that client.

Share this post


Link to post
Share on other sites

 

How about this client 2014-01-15? 

@offtopic Isn't that client unstable? I see there's many random crash with that client.

 

It's works fine for me. hmmm... 

Share this post


Link to post
Share on other sites

 

 

How about this client 2014-01-15? 

@offtopic Isn't that client unstable? I see there's many random crash with that client.

 

It's works fine for me. hmmm... 

 

 

can you share ?

Share this post


Link to post
Share on other sites

Bro, I tried to upload it but failed. My connection is very limited to upload 2gb file. I'm only using MOBILE internet anyway. :(

 

I see. Maybe you have a link of the small client from your RO site where I can download it ?

Then I guess the next will be the server side called mmo.h and packet.h

Share this post


Link to post
Share on other sites

Unfortunately, my server still under dev and only available in my local. Maybe Ossi has a private link since it was public before he decided to removed it.

Edited by Hadeszeus

Share this post


Link to post
Share on other sites

Unfortunately, my server still under dev and only available in my local. Maybe Ossi has a private link since it was public before he decided to removed it.

 

thanks ... will check with Ossi then ...

Share this post


Link to post
Share on other sites

 

Unfortunately, my server still under dev and only available in my local. Maybe Ossi has a private link since it was public before he decided to removed it.

 

thanks ... will check with Ossi then ...

I'm thinking now to change my client  :hmm: maybe there's really a bug that I have not yet encountered. They even removed the discussion of it here: http://herc.ws/board/topic/4328-2014-01-15-full-client-download/

Share this post


Link to post
Share on other sites

 

If guys search for a "not broken" client, check the list behind (each encryption tested 10 000 000 times), seems like Gravity doesn't even take time to find correct keys :

 

20110817 - PASSED
20110824 - FAILED x32
20110831 - PASSED
20110906 - PASSED
20111005 - FAILED x29
20111012 - FAILED x32
20111021 - PASSED
20111025 - PASSED
20111102 - FAILED x31
20111109 - FAILED x16
20111122 - FAILED x16
20111207 - FAILED x31
20111214 - FAILED x32
20111220 - FAILED x16
20111228 - FAILED x7
20120104 - PASSED
20120111 - PASSED
20120120 - PASSED
20120202 - PASSED
20120207 - PASSED
20120214 - FAILED x31
20120229 - PASSED
20120307 - FAILED x31
20120314 - PASSED
20120321 - PASSED
20120328 - FAILED x32
20120404 - PASSED
20120410 - FAILED x32
20120418 - FAILED x15
20120424 - FAILED x11
20120509 - PASSED
20120515 - PASSED
20120525 - FAILED x16
20120605 - PASSED
20120612 - FAILED x14
20120618 - PASSED
20120702 - PASSED
20120716 - PASSED
20130320 - FAILED x32
20130514 - PASSED
20130522 - PASSED
20130529 - FAILED x30
20130605 - PASSED
20130612 - PASSED
20130618 - PASSED
20130626 - FAILED x11
20130703 - FAILED x32
20130807 - FAILED x4
20131218 - FAILED x31
20131223 - FAILED x14
20131230 - PASSED

 

Hi KeyWorld!

 

please check 20140305 , please

 

 

 

#if PACKETVER >= 20140305

 

packetKeys(0x116763F2,0x41117DAC,0x7FD13C45); /* Themon */

 

#endif

 

 

 

 

Edited by BuLaLaKaW

Share this post


Link to post
Share on other sites

I wrote this online web service, if it can help : http://www.robrowser.com/prototype/packet-keys/

It's a tool to list the current brokens keys (and the working one), there is also a form to help generate new keys.

 

All the tests are executed 100'000 times (it's enough and avoid to freeze your browser for a while since all tests are done client-side).

 

Have fun~

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.