• Welcome to Valhalla Legends Archive.
 

Why isn't this working

Started by Michael, December 17, 2003, 12:03 PM

Previous topic - Next topic

Michael

I have read skywings post about the new warcraft3 update. I have come to the conclusion that it works the same as Diablo 2's Account email reg system. I would therefore like to know why this code is not working.

       Case &H59
       With PBuffer
       .InsertNTString BNET.Email
       .SendPacket &H59
       rtbAdd "Account reg activated, sending email as " & BNET.Email & vbNewLine, vbGreen
       End With

The reason i seem to think it does not work is that when i try to connect the bot on war3 even with that as a event to respond to it does not seem to work. My bot outputs this [12:01:50] BNLS: Connecting to BNLS.valhallalegends.com...
[12:01:50] BNLS: Connected!
[12:01:51] BNET: Connected!
[12:01:52] BNET: Version and CDKeys Passed.
[12:01:53] Unhandled Packet: 0x075
[12:01:53]  FF 75 0A 00 00 00 4E 44 47 03

and does not complete the login. just stops on
[12:01:53] Unhandled Packet: 0x075
[12:01:53]  FF 75 0A 00 00 00 4E 44 47 03

Kp

#1
Packet 0x75 is documented in Soar's thread on this forum.  It's also in BnetDocs, but that seems to be running slow still.

[Edit: fixed URL tag.]
[19:20:23] (BotNet) <[vL]Kp> Any idiot can make a bot with CSB, and many do!

______

I think he wants the solution to packet 59.

Michael

Quote from: Kp on December 17, 2003, 12:07 PM
Packet 0x75 is documented in Soar's thread on this forum.  It's also in BnetDocs, but that seems to be running slow still.

[Edit: fixed URL tag.]
As i checked it should still work and connect due to the fact that this packet does not send any info back to bnet.

Michael

Quote from: ___/\___ on December 17, 2003, 12:10 PM
I think he wants the solution to packet 59.
Yes, but i would also like to know why my bot does not go past

[12:13:33] Unhandled Packet: 0x075
[12:13:33]  FF 75 0A 00 00 00 4E 44 47 03

so that it can connect to bnet and hold ops in my clan channel.

Kp

Quote from: -MichaeL- on December 17, 2003, 12:11 PM
As i checked it should still work and connect due to the fact that this packet does not send any info back to bnet.

So your client is smart enough to proceed if it receives a packet that does not require a response?  It doesn't seem to be.  It looks to me like you put in a hook that refuses to proceed if you receive an unrecognized packet - you're now receiving an unrecognized packet (which can be safely ignored), stopping because it is unrecognized, and complaining at us as a result.

Quote from: -MichaeL- on December 17, 2003, 12:14 PM
Quote from: ___/\___ on December 17, 2003, 12:10 PMI think he wants the solution to packet 59.
Yes, but i would also like to know why my bot does not go past [12:13:33] Unhandled Packet: 0x075
[12:13:33]  FF 75 0A 00 00 00 4E 44 47 03
so that it can connect to bnet and hold ops in my clan channel.

Because you aren't observant enough to realize this is how you set it up.
[19:20:23] (BotNet) <[vL]Kp> Any idiot can make a bot with CSB, and many do!

Spht

Quote from: -MichaeL- on December 17, 2003, 12:14 PM
Quote from: ___/\___ on December 17, 2003, 12:10 PM
I think he wants the solution to packet 59.
Yes, but i would also like to know why my bot does not go past

[12:13:33] Unhandled Packet: 0x075
[12:13:33]  FF 75 0A 00 00 00 4E 44 47 03

so that it can connect to bnet and hold ops in my clan channel.

That is just telling you what clan you're in. When you get code 14 for SID_AUTH_ACCOUNTLOGONPROOF, you should either ask the user to register an account or log in normally.

Fr0z3N


Case &H75
       Select Case Asc(Right(Data, 1))
           Case &H0
               AddC vbGreen, "You are a: Peon (In clan for less then 1 week)"
           Case &H1
               AddC vbGreen, "You are a: Peon (In clan for over 1 week)"
           Case &H2
               AddC vbGreen, "You are a: Grunt"
           Case &H3
               AddC vbGreen, "You are a: Shaman"
           Case &H4
               AddC vbGreen, "You are a: Chieftain"
           End Select

Theres 0x75 for you

[14:05:41] BNET: Connected
[14:05:41] BNET: Version and CD-Key check passed!
[14:05:41] You are a: Shaman

It wont go past that now...

Smurfling

#8
Well i think that should help you passing trough.
First of all you will not receive packet 0x59! That is what you have to send in response to 0x54. You do not have to respond to 0x75, just log on anyway and all will be fine!

Details below:


                       Case &H54
                           Select Case GetDWORD(Mid(PacketData, 1, 4))
                               Case &H0
                                   If RegisterNewMail Then
                                       Insert(Type.tNTString, Username)
                                       Insert(Type.tNTString, RegeMail)
                                       Insert(Type.tNTString, NeweMail)
                                       SendPacket(&H5B)
                                   End If
                                   
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 5, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 9, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 13, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 17, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 21, 4))
                                   SendBNLSPacket(&HA)

                               Case &HE 'Here you can to register eMail with account!
                                   Insert(Type.tNTString, RegeMail)
                                   SendPacket(&H59)
                                   
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 5, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 9, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 13, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 17, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 21, 4))
                                   SendBNLSPacket(&HA)

                                   
                               Case &H2
                                   AddMessage("Account logon failed (Wrong Password?)")
                                   Disconnect()

                               Case Else
                                   If MsgBox("Unknown Battle.Net Packet: "_
                                       & vbNewLine & vbNewLine & ToHex(PacketData)_
                                       & vbNewLine & vbNewLine_
                                       & "Do you want to proceed?",_
                                       , MsgBoxStyle.YesNo,_
                                       "Continue at your own risk ;)")_
                                       = MsgBoxResult.Yes Then
                                 
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 5, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 9, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 13, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 17, 4))
                                   Insert(Type.tDWORD, GetDWORD(Mid(PacketData, 21, 4))
                                   SendBNLSPacket(&HA)
                                   
                                   Else

                                   SendPacketReport(PacketData)
                                   FormatedHexOutput(PacketData)
                                   AddMessage("Issue was sent. Please wait for reply!")


                                    End If
                           End Select


I am sorry if there should be a error within the code but i wrote it out of my head, i am at work ;)
Btw, this isn't copy & paste code. As far as i know nobody implemented my Packet Buffer Class for VB .NET, so change it to fit your own needs!

Edited: O yea - this is if you work with BNLS!
OO yea - In packet 0x5B you need the REAL eMail the account was registered with. If you specify a wrong one you will be banned immediately, so dont even try :-)

Michael

Quote from: Kp on December 17, 2003, 12:37 PM
Quote from: -MichaeL- on December 17, 2003, 12:11 PM
As i checked it should still work and connect due to the fact that this packet does not send any info back to bnet.

So your client is smart enough to proceed if it receives a packet that does not require a response?  It doesn't seem to be.  It looks to me like you put in a hook that refuses to proceed if you receive an unrecognized packet - you're now receiving an unrecognized packet (which can be safely ignored), stopping because it is unrecognized, and complaining at us as a result.

Quote from: -MichaeL- on December 17, 2003, 12:14 PM
Quote from: ___/\___ on December 17, 2003, 12:10 PMI think he wants the solution to packet 59.
Yes, but i would also like to know why my bot does not go past [12:13:33] Unhandled Packet: 0x075
[12:13:33]  FF 75 0A 00 00 00 4E 44 47 03
so that it can connect to bnet and hold ops in my clan channel.

Because you aren't observant enough to realize this is how you set it up.

First off it does not stop

       Case Else
           If Len(PacketId) = 1 Then
               rtbAdd "Unhandled Packet: 0x0" & Hex(PacketId) & vbNewLine, vbRed
           Else
               rtbAdd "Unhandled Packet: 0x" & Hex(PacketId) & vbNewLine, vbRed
           End If
           rtbAdd StrToHex(data) & vbNewLine, vbRed

Second i will try your idea soon andreas and thank also thank you to KP for tring to help +1 karma to you all

Fr0z3N

Quote from: Andreas Strobl on December 17, 2003, 01:52 PM
Well i think that should help you passing trough.
First of all you will not receive packet 0x59! That is what you have to send in response to 0x54. You do not have to respond to 0x75, just log on anyway and all will be fine!

Thank you very much I'll try it when I get home.

+1

Kp

Quote from: -MichaeL- on December 17, 2003, 04:28 PM
Quote from: -MichaeL- on December 17, 2003, 12:14 PMYes, but i would also like to know why my bot does not go past [12:13:33] Unhandled Packet: 0x075
[12:13:33]  FF 75 0A 00 00 00 4E 44 47 03
so that it can connect to bnet and hold ops in my clan channel.
First off it does not stop

"does not go past" seems to be pretty close to, if not the same as "stop".  So which is/was it?
[19:20:23] (BotNet) <[vL]Kp> Any idiot can make a bot with CSB, and many do!

Michael

#12
Quote from: Kp on December 17, 2003, 06:22 PM
Quote from: -MichaeL- on December 17, 2003, 04:28 PM
Quote from: -MichaeL- on December 17, 2003, 12:14 PMYes, but i would also like to know why my bot does not go past [12:13:33] Unhandled Packet: 0x075
[12:13:33]  FF 75 0A 00 00 00 4E 44 47 03
so that it can connect to bnet and hold ops in my clan channel.
First off it does not stop

"does not go past" seems to be pretty close to, if not the same as "stop".  So which is/was it?
well just becuase i have another problem i shall prove you wrong

[21:36:24] Unhandled Packet: 0x066
[21:36:24]  FF 66 0C 00 01 00 00 00 00 00 00 00
[21:36:38] <Whisper From: GDN-MiKe@USWest> Your friend GDN-MiKe has entered Battle.net.
[21:36:38] Unhandled Packet: 0x066
[21:36:38]  FF 66 14 00 01 01 02 33 52 41 57 43 6C 61 6E 20 47 44 4E 00
[21:40:39] <Darkst[a]r@USWest -: Now Playing: 78. metalica  - sanatarium :: StealthBot v2.3 :->
[21:42:46] a]N[t]h[R]a[X@USWest has joined the channel using Starcraft Brood War: (20 wins). and has a ping of 203ms.
[21:43:00] a]N[t]h[R]a[X@USWest has left the channel.
[21:43:20] <MiKeOwNaGe> hi

what is packet 0x066 also as you may have noticed KP it did not stop now affect the bot in anyway while being connected to bnet so therefore it does not stop the bot in any way shape or form. just spots the bot from allowing you to know what eaxtly bnet was tring to tell you.
+1 to kp for being so persitant which helps out alot in its own way makes me look at what i have done and understand it better in order to show it does not affect the bot in anyway thanks kp.

UserLoser.

#13
0x66 has to do with friends list I believe (I'm at school, don't want to goto BnetDocs to check my self)  You must be sending 0x65 if you're recieving those packets.  Check BnetDocs

Fr0z3N

http://www.valhallalegends.com/arta/bnetdocs/content.php?Code=372

0x66, SID_FRIENDUPDATE

They don't have 0x066 so I'm not sure if they're the same thing :-\