Bmsfx
June 7th, 2004, 16:44
Me and some friends have been trying for month's to crack the lineage mmorpg's blowfish code, and as far as i know (in the game's 5 years+) noone have ever successfully cracked it (and ALOT have tryed to do it).
For anyone interrestet to look at it, ill post some of the info i got now..
first i did a check on the file using a program called KANAL, it showed it was using:
Blowfish (Check 2), whatever check 2 means.
and
CRC32 (prolly just for file check)
Here are some packet stuff (key auth) happens when you connect to the server (3 packets are transfered)
peer 1_x = server -> client
peer 0_x = client -> server
char peer1_0[] = {
0x0a, 0x00, 0x29, 0xe5, 0x4c, 0x66, 0x79, 0xa8,
0x00, 0x4e
};
char peer0_0[] = {
0x0e, 0x00, 0xcb, 0x45, 0x03, 0xa9, 0x8f, 0x9b,
0x01, 0x20, 0x8c, 0x3b, 0xa8, 0x82
};
char peer1_1[] = {
0x22, 0x00, 0x60, 0xfe, 0x9b, 0x13, 0xac, 0xb8,
0x22, 0x12, 0x3b, 0x11, 0xf6, 0x22, 0x9e, 0x8a,
0x10, 0x45, 0x6c, 0x46, 0xa1, 0xb4, 0x9c, 0x35,
0xef, 0xce, 0xfa, 0xd1, 0x0b, 0x50, 0x95, 0x70,
0xa9, 0x2e
};
firsly some packet info on those 3.
first [xx xx] of every packet = size of packet
rest is data & opcodes and so on.
the 1_0 packet is always code [0x0a 0x00] [0x29] (where 0x29 is opcode)
rest of the data you see is always random numbers and stuff.
we belive server sends a key to client, and client returns a new key encryptet with the key server sends, and then at last packet server receive a key from client wich is the key to use.
(also note, these packets are always same size).
i can post a few here (else go download lineage from www.lineage.com)
packet 1
char peer1_0[] = {
0x0a, 0x00, 0x29, 0xe5, 0x4c, 0x66, 0x79, 0xa8,
0x00, 0x4e
};
char peer0_0[] = {
0x0e, 0x00, 0xcb, 0x45, 0x03, 0xa9, 0x8f, 0x9b,
0x01, 0x20, 0x8c, 0x3b, 0xa8, 0x82
};
char peer1_1[] = {
0x22, 0x00, 0x60, 0xfe, 0x9b, 0x13, 0xac, 0xb8,
0x22, 0x12, 0x3b, 0x11, 0xf6, 0x22, 0x9e, 0x8a,
0x10, 0x45, 0x6c, 0x46, 0xa1, 0xb4, 0x9c, 0x35,
0xef, 0xce, 0xfa, 0xd1, 0x0b, 0x50, 0x95, 0x70,
0xa9, 0x2e
};
packet 2
char peer1_0[] = {
0x0a, 0x00, 0x29, 0x0b, 0x95, 0x58, 0x0b, 0xbf,
0x00, 0x12
};
char peer0_0[] = {
0x0e, 0x00, 0x4e, 0xa7, 0x70, 0x01, 0xa2, 0x27,
0xce, 0x20, 0x7a, 0x5c, 0xbc, 0x59
};
char peer1_1[] = {
0x22, 0x00, 0xe5, 0x1c, 0xe8, 0xbb, 0x81, 0x04,
0xed, 0x12, 0xcd, 0x76, 0xe2, 0xf9, 0xb3, 0x36,
0xdf, 0x45, 0x9a, 0x21, 0xb5, 0x6f, 0xb1, 0x89,
0x20, 0xce, 0x0c, 0xb6, 0x1f, 0x17, 0x24, 0x79,
0xe2, 0xce
};
packet 3
char peer1_0[] = {
0x0a, 0x00, 0x29, 0xb3, 0x75, 0xbd, 0x4c, 0xa2,
0x00, 0x06
};
char peer0_0[] = {
0x0e, 0x00, 0xa3, 0x5a, 0xb2, 0x14, 0x5a, 0xe0,
0xcb, 0x20, 0x55, 0x4c, 0x6e, 0x8e
};
char peer1_1[] = {
0x22, 0x00, 0x08, 0xe1, 0x2a, 0xae, 0x79, 0xc3,
0xe8, 0x12, 0xe2, 0x66, 0x30, 0x2e, 0x4b, 0xf1,
0xda, 0x45, 0xb5, 0x31, 0x67, 0xb8, 0x49, 0x4e,
0x25, 0xce, 0x23, 0xa6, 0xcd, 0x8d, 0x91, 0x0c,
0x7b, 0x54
};
packet 4
char peer1_0[] = {
0x0a, 0x00, 0x29, 0x75, 0xa8, 0x61, 0x25, 0xf1,
0xd8, 0xf6
};
char peer0_0[] = {
0x0e, 0x00, 0x76, 0x27, 0x81, 0x52, 0xc9, 0x3d,
0x25, 0x20, 0xb3, 0xe4, 0xf5, 0xfb
};
char peer1_1[] = {
0x22, 0x00, 0xdd, 0x9c, 0x19, 0xe8, 0xea, 0x1e,
0x06, 0x12, 0x04, 0xce, 0xab, 0x5b, 0xd8, 0x2c,
0x34, 0x45, 0x53, 0x99, 0xfc, 0xcd, 0xda, 0x93,
0xcb, 0xce, 0xc5, 0x0e, 0x56, 0xf8, 0x02, 0xc1,
0xe4, 0xe1
};
I tryed checking the lin.bin file in IDA but im getting sooo lost all the time.
anyways, if anyone wanna have a go or can provide more info, all info is welcome
Thanks.
For anyone interrestet to look at it, ill post some of the info i got now..
first i did a check on the file using a program called KANAL, it showed it was using:
Blowfish (Check 2), whatever check 2 means.
and
CRC32 (prolly just for file check)
Here are some packet stuff (key auth) happens when you connect to the server (3 packets are transfered)
peer 1_x = server -> client
peer 0_x = client -> server
char peer1_0[] = {
0x0a, 0x00, 0x29, 0xe5, 0x4c, 0x66, 0x79, 0xa8,
0x00, 0x4e
};
char peer0_0[] = {
0x0e, 0x00, 0xcb, 0x45, 0x03, 0xa9, 0x8f, 0x9b,
0x01, 0x20, 0x8c, 0x3b, 0xa8, 0x82
};
char peer1_1[] = {
0x22, 0x00, 0x60, 0xfe, 0x9b, 0x13, 0xac, 0xb8,
0x22, 0x12, 0x3b, 0x11, 0xf6, 0x22, 0x9e, 0x8a,
0x10, 0x45, 0x6c, 0x46, 0xa1, 0xb4, 0x9c, 0x35,
0xef, 0xce, 0xfa, 0xd1, 0x0b, 0x50, 0x95, 0x70,
0xa9, 0x2e
};
firsly some packet info on those 3.
first [xx xx] of every packet = size of packet
rest is data & opcodes and so on.
the 1_0 packet is always code [0x0a 0x00] [0x29] (where 0x29 is opcode)
rest of the data you see is always random numbers and stuff.
we belive server sends a key to client, and client returns a new key encryptet with the key server sends, and then at last packet server receive a key from client wich is the key to use.
(also note, these packets are always same size).
i can post a few here (else go download lineage from www.lineage.com)
packet 1
char peer1_0[] = {
0x0a, 0x00, 0x29, 0xe5, 0x4c, 0x66, 0x79, 0xa8,
0x00, 0x4e
};
char peer0_0[] = {
0x0e, 0x00, 0xcb, 0x45, 0x03, 0xa9, 0x8f, 0x9b,
0x01, 0x20, 0x8c, 0x3b, 0xa8, 0x82
};
char peer1_1[] = {
0x22, 0x00, 0x60, 0xfe, 0x9b, 0x13, 0xac, 0xb8,
0x22, 0x12, 0x3b, 0x11, 0xf6, 0x22, 0x9e, 0x8a,
0x10, 0x45, 0x6c, 0x46, 0xa1, 0xb4, 0x9c, 0x35,
0xef, 0xce, 0xfa, 0xd1, 0x0b, 0x50, 0x95, 0x70,
0xa9, 0x2e
};
packet 2
char peer1_0[] = {
0x0a, 0x00, 0x29, 0x0b, 0x95, 0x58, 0x0b, 0xbf,
0x00, 0x12
};
char peer0_0[] = {
0x0e, 0x00, 0x4e, 0xa7, 0x70, 0x01, 0xa2, 0x27,
0xce, 0x20, 0x7a, 0x5c, 0xbc, 0x59
};
char peer1_1[] = {
0x22, 0x00, 0xe5, 0x1c, 0xe8, 0xbb, 0x81, 0x04,
0xed, 0x12, 0xcd, 0x76, 0xe2, 0xf9, 0xb3, 0x36,
0xdf, 0x45, 0x9a, 0x21, 0xb5, 0x6f, 0xb1, 0x89,
0x20, 0xce, 0x0c, 0xb6, 0x1f, 0x17, 0x24, 0x79,
0xe2, 0xce
};
packet 3
char peer1_0[] = {
0x0a, 0x00, 0x29, 0xb3, 0x75, 0xbd, 0x4c, 0xa2,
0x00, 0x06
};
char peer0_0[] = {
0x0e, 0x00, 0xa3, 0x5a, 0xb2, 0x14, 0x5a, 0xe0,
0xcb, 0x20, 0x55, 0x4c, 0x6e, 0x8e
};
char peer1_1[] = {
0x22, 0x00, 0x08, 0xe1, 0x2a, 0xae, 0x79, 0xc3,
0xe8, 0x12, 0xe2, 0x66, 0x30, 0x2e, 0x4b, 0xf1,
0xda, 0x45, 0xb5, 0x31, 0x67, 0xb8, 0x49, 0x4e,
0x25, 0xce, 0x23, 0xa6, 0xcd, 0x8d, 0x91, 0x0c,
0x7b, 0x54
};
packet 4
char peer1_0[] = {
0x0a, 0x00, 0x29, 0x75, 0xa8, 0x61, 0x25, 0xf1,
0xd8, 0xf6
};
char peer0_0[] = {
0x0e, 0x00, 0x76, 0x27, 0x81, 0x52, 0xc9, 0x3d,
0x25, 0x20, 0xb3, 0xe4, 0xf5, 0xfb
};
char peer1_1[] = {
0x22, 0x00, 0xdd, 0x9c, 0x19, 0xe8, 0xea, 0x1e,
0x06, 0x12, 0x04, 0xce, 0xab, 0x5b, 0xd8, 0x2c,
0x34, 0x45, 0x53, 0x99, 0xfc, 0xcd, 0xda, 0x93,
0xcb, 0xce, 0xc5, 0x0e, 0x56, 0xf8, 0x02, 0xc1,
0xe4, 0xe1
};
I tryed checking the lin.bin file in IDA but im getting sooo lost all the time.
anyways, if anyone wanna have a go or can provide more info, all info is welcome

Thanks.