Hi, I haven't been programming in awhile and I wanna start getting into some things right now but it seems pointless to write the connection that everyones written again. So all I need it a core connection that will connect hashed to diablo2/lod. Thanks alot.
Fix your title.
What's wrong with it?
You want us to give you the code for the (almost) most difficult part of creating a Bnet bot? How about you use jsut CSB is you are just gona lech.
~-~(HDX)~-~
ALRIGHT, I guess I'll help him.
Now, be grateful!
winsock1.connect "useast.battle.net", 6112
you owe me one man.
Quote from: i8tweety on August 24, 2005, 08:49 PM
So all I need it a core connection that will connect hashed to diablo2/lod. Thanks alot.
Perhaps you misread his post?
Quote from: i8tweety on August 24, 2005, 08:49 PM
Hi, I haven't been programming in awhile and I wanna start getting into some things right now but it seems pointless to write the connection that everyones written again. So all I need it a core connection that will connect hashed to diablo2/lod. Thanks alot.
If you can make Feanor's TCPConnection class un-suck, it might work still maybe....Anyways, why don't you just write your own like everyone else who has any skill has done? It's really not to hard when you use something like BnetDocs (http://bnetdocs.valhallalegends.com) in junction with a reference forum (http://forum.valhallalegends.com/phpbbs/index.php?board=45.0) and a place to ask questions (http://forum.valhallalegends.com/phpbbs/index.php?board=17.0).
Read the VB6 programming forum guidelines. Grok's going to kill you, because you called it vB.
Quote from: PiaNKA on August 24, 2005, 10:05 PM
Quote from: i8tweety on August 24, 2005, 08:49 PM
So all I need it a core connection that will connect hashed to diablo2/lod. Thanks alot.
Perhaps you misread his post?
Thanks Ricky.
Too everyone else, I've written it about 10 times, its a waist of time when everyone has it thats why I'm asking.
Yeah, so since everyone has done it, and you want to be a nub and leech code, then by all means download an open source and rip it's connection. There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
Now, on the other hand, if you ARE skillful enough to understand winsock and the Battle.net packets (http://bnetdocs.valhallalegends.com) then write your connection. There are public hashing libraries which you may freely use for the hashing functions (I suggest BNCSUtil (http://bncsutil.ionws.com) which is open source and has a Visual Basic example source written by the author).
Now I recommend you use suggestion #2 because it is simply more mature and probably will be more stable and you will be able to always understand your code more than anyone else's. If you cannot work with either of these suggestions then go use CSB.
Quote from: i8tweety on August 24, 2005, 11:52 PM
Too everyone else, I've written it about 10 times, its a waist of time when everyone has it thats why I'm asking.
Then why not use one of the ten you've already written?
Quote from: Joex86] link=topic=12612.msg125352#msg125352 date=1124945081]
Read the VB6 programming forum guidelines. Grok's going to kill you, because you called it vB.
See my post.
On topic: Nobody here supports csb (Maybe zorm does... *shrug*) but if its that or leaching, take that or don't do it.
There is a stickied post in this forum that has links to everything you'd need to know to make a bot.
here (http://forum.valhallalegends.com/phpbbs/index.php?topic=11932.0)
Thanks to Ringo for that.
Quote from: l2k-Shadow on August 25, 2005, 01:00 AM
Yeah, so since everyone has done it, and you want to be a nub and leech code, then by all means download an open source and rip it's connection. There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
Now, on the other hand, if you ARE skillful enough to understand winsock and the Battle.net packets (http://bnetdocs.valhallalegends.com) then write your connection. There are public hashing libraries which you may freely use for the hashing functions (I suggest BNCSUtil (http://bncsutil.ionws.com) which is open source and has a Visual Basic example source written by the author).
Now I recommend you use suggestion #2 because it is simply more mature and probably will be more stable and you will be able to always understand your code more than anyone else's. If you cannot work with either of these suggestions then go use CSB.
This coming from the guy that makes crappy leeched bots to begin with. -.-
If you wish to argue with me:
Quote
There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
I believe your shitty ass bot's source got leaked and is throughly leeched.
Blaze: I support CSB. :)
Anyways, it's always better to write your own connection method. This way you will actually understand what is going on.
Quote from: Networks on August 25, 2005, 09:00 AM
Quote from: l2k-Shadow on August 25, 2005, 01:00 AM
Yeah, so since everyone has done it, and you want to be a nub and leech code, then by all means download an open source and rip it's connection. There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
Now, on the other hand, if you ARE skillful enough to understand winsock and the Battle.net packets (http://bnetdocs.valhallalegends.com) then write your connection. There are public hashing libraries which you may freely use for the hashing functions (I suggest BNCSUtil (http://bncsutil.ionws.com) which is open source and has a Visual Basic example source written by the author).
Now I recommend you use suggestion #2 because it is simply more mature and probably will be more stable and you will be able to always understand your code more than anyone else's. If you cannot work with either of these suggestions then go use CSB.
This coming from the guy that makes crappy leeched bots to begin with. -.-
If you wish to argue with me:
Quote
There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
I believe your shitty ass bot's source got leaked and is throughly leeched.
DAMN! You beat me to it!
Anyway yea, don't worry dude just dive into it. I'm sure if people see you putting some thought into your own implementation they will help you with any obstacles you may face.
Good luck.
I don't have any links for you, but the login sequences for W2BN/STAR-SEXP/D2DV are nearly identical. The only real difference is the verbyte and product sending. If you can find an open source bot with STAR hashing, you've got what you're looking for.
Note that adding D2XP requires a little work, you can refer to BnetDocs for help with that.
Quote from: QwertyMonster on August 25, 2005, 06:30 AM
here (http://forum.valhallalegends.com/phpbbs/index.php?topic=11932.0)
Thanks to Ringo for that.
..
Quote from: Networks on August 25, 2005, 09:00 AM
Quote from: l2k-Shadow on August 25, 2005, 01:00 AM
Yeah, so since everyone has done it, and you want to be a nub and leech code, then by all means download an open source and rip it's connection. There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
Now, on the other hand, if you ARE skillful enough to understand winsock and the Battle.net packets (http://bnetdocs.valhallalegends.com) then write your connection. There are public hashing libraries which you may freely use for the hashing functions (I suggest BNCSUtil (http://bncsutil.ionws.com) which is open source and has a Visual Basic example source written by the author).
Now I recommend you use suggestion #2 because it is simply more mature and probably will be more stable and you will be able to always understand your code more than anyone else's. If you cannot work with either of these suggestions then go use CSB.
This coming from the guy that makes crappy leeched bots to begin with. -.-
I believe your shitty ass bot's source got leaked and is throughly leeched.
Bot got leaked because I gave it to the wrong person. The source is not leeched, apparently you are a complete nub since you cannot see that the source is not comparable to any other bot source out there. Oh and btw the reason "It uses same sub names" is not acceptable. Also I do not understand the leaker's moronic thinking. I was not trojaned for the source, or anything of that source.. I gave it out.. so why the fuck would I leave a backdoor inside it? You are just one immature idiot who will never succeed in life.
Shadow, you're not making the situation any better with posts like that.
------------------
To contribute to the actual thread, I don't see much reason for someone to learn the VERY back-end of something like a bot. They need to learn string parsing, and that's about it. They don't have to learn what's going on in the background (that's why you're using VB anyway, right?) to get it working/have fun.
Yea, use CopyMemory and Mid() and stuff. Easy.
Quote from: l2k-Shadow on August 25, 2005, 08:11 PM
Quote from: Networks on August 25, 2005, 09:00 AM
Quote from: l2k-Shadow on August 25, 2005, 01:00 AM
Yeah, so since everyone has done it, and you want to be a nub and leech code, then by all means download an open source and rip it's connection. There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
Now, on the other hand, if you ARE skillful enough to understand winsock and the Battle.net packets (http://bnetdocs.valhallalegends.com) then write your connection. There are public hashing libraries which you may freely use for the hashing functions (I suggest BNCSUtil (http://bncsutil.ionws.com) which is open source and has a Visual Basic example source written by the author).
Now I recommend you use suggestion #2 because it is simply more mature and probably will be more stable and you will be able to always understand your code more than anyone else's. If you cannot work with either of these suggestions then go use CSB.
This coming from the guy that makes crappy leeched bots to begin with. -.-
I believe your shitty ass bot's source got leaked and is throughly leeched.
Bot got leaked because I gave it to the wrong person. The source is not leeched, apparently you are a complete nub since you cannot see that the source is not comparable to any other bot source out there. Oh and btw the reason "It uses same sub names" is not acceptable. Also I do not understand the leaker's moronic thinking. I was not trojaned for the source, or anything of that source.. I gave it out.. so why the fuck would I leave a backdoor inside it? You are just one immature idiot who will never succeed in life.
I commend you for being able to leech unnoticably. From what I've seen, people have a certain skill level in there coding. When you reach bot development you would think some people have the ability to code semi-neatly especially when they do not leech. I think it's rather sophisticated programming to be able to get a bot to connect to battle.net through a product like Warcraft III or Starcraft. You really have to learn a lot. Your code in that bot does
not exhibit efficient or neat coding whatsoever.
Also something I've noticed with leechers. Leechers have the tendency to copy and paste correct? You're coding fluctuates between indented coding and non-indented coding. Either you got better over time or you copied and pasted and wrote some of your code.
With all the new advancements in BotDev anyone with fairly decent knowledge of the programming language can connect to battle.net (BNCSUtil, BNLS, BNLSRipoffs, etc..).
Quote from: Warrior on August 28, 2005, 12:41 PM
With all the new advancements in BotDev anyone with fairly decent knowledge of the programming language can connect to battle.net (BNCSUtil, BNLS, BNLSRipoffs, etc..).
Oh shut up, you probably had more experience when you were working with CSB then Shadow did with his binary bot. You only say that now because you're experienced.
True, true. I still see it as easy and me overcomplicating things while I wrote my first binary bot.
tweety hasn't come back....just let this die.........
Quote from: Networks on August 28, 2005, 12:36 PM
Quote from: l2k-Shadow on August 25, 2005, 08:11 PM
Quote from: Networks on August 25, 2005, 09:00 AM
Quote from: l2k-Shadow on August 25, 2005, 01:00 AM
Yeah, so since everyone has done it, and you want to be a nub and leech code, then by all means download an open source and rip it's connection. There are plenty of open sources which may connect to d2/d2 LoD client through a locally hashed connection. Now if you cannot rip the connection from an open source, then don't even think about writing your own..
Now, on the other hand, if you ARE skillful enough to understand winsock and the Battle.net packets (http://bnetdocs.valhallalegends.com) then write your connection. There are public hashing libraries which you may freely use for the hashing functions (I suggest BNCSUtil (http://bncsutil.ionws.com) which is open source and has a Visual Basic example source written by the author).
Now I recommend you use suggestion #2 because it is simply more mature and probably will be more stable and you will be able to always understand your code more than anyone else's. If you cannot work with either of these suggestions then go use CSB.
This coming from the guy that makes crappy leeched bots to begin with. -.-
I believe your shitty ass bot's source got leaked and is throughly leeched.
Bot got leaked because I gave it to the wrong person. The source is not leeched, apparently you are a complete nub since you cannot see that the source is not comparable to any other bot source out there. Oh and btw the reason "It uses same sub names" is not acceptable. Also I do not understand the leaker's moronic thinking. I was not trojaned for the source, or anything of that source.. I gave it out.. so why the fuck would I leave a backdoor inside it? You are just one immature idiot who will never succeed in life.
I commend you for being able to leech unnoticably. From what I've seen, people have a certain skill level in there coding. When you reach bot development you would think some people have the ability to code semi-neatly especially when they do not leech. I think it's rather sophisticated programming to be able to get a bot to connect to battle.net through a product like Warcraft III or Starcraft. You really have to learn a lot. Your code in that bot does not exhibit efficient or neat coding whatsoever.
Also something I've noticed with leechers. Leechers have the tendency to copy and paste correct? You're coding fluctuates between indented coding and non-indented coding. Either you got better over time or you copied and pasted and wrote some of your code.
Can we see your first bot's code?
Quote from: NetNX on August 29, 2005, 08:41 PM
Can we see your first bot's code?
Does he even have a bot? He has a point, and whether or not you call him a hypocrite is irrelevant. What he says is true.
I hate it when people wait all the way until the end of the freeway exit to move over into the exit lane. That doesn't mean I never do it -- I try not to, but sometimes it's unavoidable. I've incorporated pieces of other people's work into my projects (I've used a BigInteger class and a PropertyBag class for various reasons in various places). It's not a mortal sin to copy code. It is to do it and then expect everyone else to babysit that code for him. (OK, maybe not a *mortal sin*, but close!
Quote from: MyndFyre on August 29, 2005, 08:51 PM
Quote from: NetNX on August 29, 2005, 08:41 PM
Can we see your first bot's code?
Does he even have a bot? He has a point, and whether or not you call him a hypocrite is irrelevant. What he says is true.
I hate it when people wait all the way until the end of the freeway exit to move over into the exit lane. That doesn't mean I never do it -- I try not to, but sometimes it's unavoidable. I've incorporated pieces of other people's work into my projects (I've used a BigInteger class and a PropertyBag class for various reasons in various places). It's not a mortal sin to copy code. It is to do it and then expect everyone else to babysit that code for him. (OK, maybe not a *mortal sin*, but close!
I'm kinda ignorant when it comes to situatations like this "remembers the nls.dll incident **shivers**" I personally would rip anyone off aslong as i saw proper need to do so. I guess im a sinner but I always give credit... What I find is that most good programers use other peoples sources to better understand what they do and/or they belive the source if rewritten wouldnt be much diffrent or better then the original source... As for Mr. l2k-Shadow, someone I program with frequently he wont even let me help him sometimes because he would much rather sit there and try and figure it out himself. So saying hes a source stealer dosen't make very much sence... So do you have any proof?
Quote from: NetNX on August 31, 2005, 08:31 PM
Quote from: MyndFyre on August 29, 2005, 08:51 PM
Quote from: NetNX on August 29, 2005, 08:41 PM
Can we see your first bot's code?
Does he even have a bot? He has a point, and whether or not you call him a hypocrite is irrelevant. What he says is true.
I hate it when people wait all the way until the end of the freeway exit to move over into the exit lane. That doesn't mean I never do it -- I try not to, but sometimes it's unavoidable. I've incorporated pieces of other people's work into my projects (I've used a BigInteger class and a PropertyBag class for various reasons in various places). It's not a mortal sin to copy code. It is to do it and then expect everyone else to babysit that code for him. (OK, maybe not a *mortal sin*, but close!
I'm kinda ignorant when it comes to situatations like this "remembers the nls.dll incident **shivers**" I personally would rip anyone off aslong as i saw proper need to do so. I guess im a sinner but I always give credit... What I find is that most good programers use other peoples sources to better understand what they do and/or they belive the source if rewritten wouldnt be much diffrent or better then the original source... As for Mr. l2k-Shadow, someone I program with frequently he wont even let me help him sometimes because he would much rather sit there and try and figure it out himself. So saying hes a source stealer dosen't make very much sence... So do you have any proof?
This *BELONGS* in a private message. This also belongs in a private message, but i want it as a example of what a private message should consist of.
Quote from: BaDDBLooD on September 01, 2005, 11:11 PM
This *BELONGS* in a private message. This also belongs in a private message, but i want it as a example of what a private message should consist of.
Why?
Quote from: BaDDBLooD on September 01, 2005, 11:11 PM
Quote from: NetNX on August 31, 2005, 08:31 PM
Quote from: MyndFyre on August 29, 2005, 08:51 PM
Quote from: NetNX on August 29, 2005, 08:41 PM
Can we see your first bot's code?
Does he even have a bot? He has a point, and whether or not you call him a hypocrite is irrelevant. What he says is true.
I hate it when people wait all the way until the end of the freeway exit to move over into the exit lane. That doesn't mean I never do it -- I try not to, but sometimes it's unavoidable. I've incorporated pieces of other people's work into my projects (I've used a BigInteger class and a PropertyBag class for various reasons in various places). It's not a mortal sin to copy code. It is to do it and then expect everyone else to babysit that code for him. (OK, maybe not a *mortal sin*, but close!
I'm kinda ignorant when it comes to situatations like this "remembers the nls.dll incident **shivers**" I personally would rip anyone off aslong as i saw proper need to do so. I guess im a sinner but I always give credit... What I find is that most good programers use other peoples sources to better understand what they do and/or they belive the source if rewritten wouldnt be much diffrent or better then the original source... As for Mr. l2k-Shadow, someone I program with frequently he wont even let me help him sometimes because he would much rather sit there and try and figure it out himself. So saying hes a source stealer dosen't make very much sence... So do you have any proof?
This *BELONGS* in a private message. This also belongs in a private message, but i want it as a example of what a private message should consist of.
Nobody loves you.
LET IT DIE