lotro revenge

A blog about gathering internal information about LOTRO.

Montag, 7. November 2016

HowTo: Understand 0B000002 vs. 0B004002 packets

›
The 0B000002 and 0B004002 are both ping pong packets (i.e. they are exchanged between client and server without any user input, just to conf...
62 Kommentare:
Dienstag, 1. November 2016

HowTo: Read the first packet sent by the server

›
The first packet sent by the server back to the client can be understood as follows: Header: Bytes Description Length 0x00-0x01 Set t...
2 Kommentare:

HowTo: Read the first packet sent by the client

›
The first packet sent by the client to the server can be understood as follows: Header: Bytes Description Length 0x00-0x01 Set to 00 ...
1 Kommentar:
Sonntag, 30. Oktober 2016

HowTo: Understanding a packet header

›
Let's take a look at some of the packets we already know and understand. First of a few basics as a reminder: each and every packet ha...
Freitag, 28. Oktober 2016

HowTo: Capture decrypted packets

›
To get decrypted packets for further analysis, you can easily capture and decrypt them using the LOTRO-Tools. First of all clone the git r...

HowTo: Use LOTRO-Tools on Linux

›
LOTRO-Tools was developed on Windows using winpcap. It fails on Linux because SharpPcap is erroneously looking for "libwpcap.so" (...

HowTo: Capture the appropriate packets between the client and the server

›
To only capture the packets necessary for analysis of the game protocol (i.e. not the chat protocol), you can use the following pcap (e.g. W...
›
Startseite
Web-Version anzeigen
Powered by Blogger.