Jump to content
  • 0
Sign in to follow this  
onnrain

need help on anti wpe

Question

i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :( :( :(

Share this post


Link to post
Share on other sites

2 answers to this question

Recommended Posts

  • 0

i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :( :( :(

1. get the hash codes of your client using this website http://onlinemd5.com/

2. trunk/conf/login/login-server.conf and find this line of code

 

		//==================================================================
		// Client hash checking system
		//==================================================================
		// Note: see doc/md5_hashcheck.txt for more details.
		hash: {
			// Client MD5 hash check
			// If turned on, the login server will check if the client's hash matches
			// the value below, and will not connect tampered clients.
			enabled: false

			// Client MD5 hashes
			// The client with the specified hash can be used to log in by players with
			// a group_id equal to or greater than the given value.
			// If you specify 'disabled' as hash, players with a group_id greater than or
			// equal to the given value will be able to log in regardless of hash (and even
			// if their client does not send a hash at all.)
			MD5_hashes: (
			//{
			//	group_id: group id
			//	hash: client hash
			//},
			//{
			//	group_id: 0
			//	hash: "52227DDB3342AEE9C3206FC49B22C138"
			//},
			//{
			//	group_id: 98
			//	hash: "52227DDB3342AEE9C3206FC49B22C138"
			//},
			//{
			//	group_id: 99
			//	hash: "52227DDB3342AEE9C3206FC49B22C138"
			//},
			)
		} // login_configuration.permission.hash

3. Enable them all like this.

 

		//==================================================================
		// Client hash checking system
		//==================================================================
		// Note: see doc/md5_hashcheck.txt for more details.
		hash: {
			// Client MD5 hash check
			// If turned on, the login server will check if the client's hash matches
			// the value below, and will not connect tampered clients.
			enabled: true

			// Client MD5 hashes
			// The client with the specified hash can be used to log in by players with
			// a group_id equal to or greater than the given value.
			// If you specify 'disabled' as hash, players with a group_id greater than or
			// equal to the given value will be able to log in regardless of hash (and even
			// if their client does not send a hash at all.)
			MD5_hashes: (
			{
				group_id: group id
				hash: client hash
			},
			{
				group_id: 0
				hash: "52227DDB3342AEE9C3206FC49B22C138"
			},
			{
				group_id: 98
				hash: "52227DDB3342AEE9C3206FC49B22C138"
			},
			{
				group_id: 99
				hash: "52227DDB3342AEE9C3206FC49B22C138"
			},
			)
		} // login_configuration.permission.hash

52227DDB3342AEE9C3206FC49B22C138 is the has code from the site i give in number 1. change it on the hash code you get in your client.

 

This will fix the packet error.

 

And recompile your server if you modified your packets.h

Share this post


Link to post
Share on other sites
  • 0

 

i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :( :( :(

1. get the hash codes of your client using this website http://onlinemd5.com/

2. trunk/conf/login/login-server.conf and find this line of code

 

		//==================================================================
		// Client hash checking system
		//==================================================================
		// Note: see doc/md5_hashcheck.txt for more details.
		hash: {
			// Client MD5 hash check
			// If turned on, the login server will check if the client's hash matches
			// the value below, and will not connect tampered clients.
			enabled: false

			// Client MD5 hashes
			// The client with the specified hash can be used to log in by players with
			// a group_id equal to or greater than the given value.
			// If you specify 'disabled' as hash, players with a group_id greater than or
			// equal to the given value will be able to log in regardless of hash (and even
			// if their client does not send a hash at all.)
			MD5_hashes: (
			//{
			//	group_id: group id
			//	hash: client hash
			//},
			//{
			//	group_id: 0
			//	hash: "52227DDB3342AEE9C3206FC49B22C138"
			//},
			//{
			//	group_id: 98
			//	hash: "52227DDB3342AEE9C3206FC49B22C138"
			//},
			//{
			//	group_id: 99
			//	hash: "52227DDB3342AEE9C3206FC49B22C138"
			//},
			)
		} // login_configuration.permission.hash

3. Enable them all like this.

 

		//==================================================================
		// Client hash checking system
		//==================================================================
		// Note: see doc/md5_hashcheck.txt for more details.
		hash: {
			// Client MD5 hash check
			// If turned on, the login server will check if the client's hash matches
			// the value below, and will not connect tampered clients.
			enabled: true

			// Client MD5 hashes
			// The client with the specified hash can be used to log in by players with
			// a group_id equal to or greater than the given value.
			// If you specify 'disabled' as hash, players with a group_id greater than or
			// equal to the given value will be able to log in regardless of hash (and even
			// if their client does not send a hash at all.)
			MD5_hashes: (
			{
				group_id: group id
				hash: client hash
			},
			{
				group_id: 0
				hash: "52227DDB3342AEE9C3206FC49B22C138"
			},
			{
				group_id: 98
				hash: "52227DDB3342AEE9C3206FC49B22C138"
			},
			{
				group_id: 99
				hash: "52227DDB3342AEE9C3206FC49B22C138"
			},
			)
		} // login_configuration.permission.hash

52227DDB3342AEE9C3206FC49B22C138 is the has code from the site i give in number 1. change it on the hash code you get in your client.

 

This will fix the packet error.

 

And recompile your server if you modified your packets.h

its not working.. still showing this

 

 [Warning]: clif_parse: Received unsupported packet (packet 0x638f (0x094b), 19 bytes received), disconnecting session #7.

 

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Answer this question...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
Sign in to follow this  

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.