• Welcome to Valhalla Legends Archive.
 

[VB6] 0x0F Problems... [SOLVED]

Started by Blaze, June 20, 2004, 07:51 PM

Previous topic - Next topic

Blaze

I am having a problem with my checksum...

[8:35:33 PM] [Inferno] InfernoBot 1.2.1174 By Kk)Blaze(kK
[8:35:33 PM] [Inferno] http://www.xstarcraftx.net/
[8:35:33 PM] [Inferno] Checking for Bot Updates...
[8:35:33 PM] [Inferno] Current Version = 1.2.1174
[8:35:33 PM] [Inferno] Newest Version  = 1.2.1165
[8:35:33 PM] [Inferno] You are using a version that is not released.
[8:35:34 PM] [Inferno] BNLS Connecting
[8:35:34 PM] [Inferno] BNLS: Connected
[8:35:34 PM] Sent 0x0E
[8:35:34 PM] Recived 0x0E
[8:35:34 PM] Sent 0x0F

It stops doing everything after I send my checksum... I am using Yoni's CheckSum...


Heres my packet code...

ElseIf BNLSPacketName = "0x0F" Then
Dim CheckSum As Long
       Dim key As Long, key2 As Long
       key2 = Functions.GetDWORD(Mid(Data, 4, 4))
       key = BNLSChecksum(pass, key2)
Packet2.InsertDWORD key
Packet2.SendPacket &HF
       If GetStuff("Misc", "Debug") = "1" Then
           AddChat "Sent 0x0F", &HFFFFC0
       End If
End If


Don't post your BNLS passwords, please.  They're yours and yours only.
- Spht
Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No

StepAside

Do you mean to tell us you're sending the CheckSum when you RECEIVE 0x0F?

Spht

#2
Quote from: Kk)Blaze(kK on June 20, 2004, 07:51 PMElseIf BNLSPacketName = "0x0F" Then

That should probably be ElseIf BNLSPacketName = "0x0E" Then... I have to ask, why are you identifying the packet id like that?

Anyway, if it still doesn't work,

Quote from: Kk)Blaze(kK on June 20, 2004, 07:51 PMkey2 = Functions.GetDWORD(Mid(Data, 4, 4))

Should probably be key2 = Functions.GetDWORD(Mid(Data, 5, 4))?  I'm guessing "Data" contains the whole packet (including header), so Mid(Data, 5, 4) will get the DWORD after the four-byte header.

Blaze

#3
I made 1 function for sending all packets.. Not an indivudual one for each...

usage,
BNLS PacketName, Data


Public Function BNLS(ByVal BNLSPacketName As String, Optional ByVal data As String)

If BNLSPacketName = "0x01" Then
' add packet here...
end if
If BNLSPacketName = "0x02" Then
' add packet here...
end if
End Function



Quote from: Spht on June 20, 2004, 09:11 PM
Should probably be key2 = Functions.GetDWORD(Mid(Data, 5, 4))?  I'm guessing "Data" contains the whole packet (including header), so Mid(Data, 5, 4) will get the DWORD after the four-byte header.

Changing it to 5, 4 isn't working either...


Quote from: StepAside on June 20, 2004, 08:35 PM
Do you mean to tell us you're sending the CheckSum when you RECEIVE 0x0F?

No... I am sending it in &HF not after the response from &HF... My problem is I am getting no response after sending my &HF...



btw, My password is no good to them if they don't have the name of the account...

btw2, Did you change your avatar?
Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No

Spht

Quote from: Kk)Blaze(kK on June 21, 2004, 06:27 PMbtw, My password is no good to them if they don't have the name of the account...

It's probably easier to guess a username than a password.  Account authorization is going to be removed from BNLS in the future anyway, but for now don't post them.

Quote from: Kk)Blaze(kK on June 21, 2004, 06:27 PMbtw2, Did you change your avatar?

Yes, it's to commemorate my resplendent approach to YaBB Godism.

Blaze

#5
When is it going to be removed? Soon I hope... ;D

btw, Its still not responding...

[7:51:11 PM] [Inferno] InfernoBot 1.2.1174 By Kk)Blaze(kK
[7:51:11 PM] [Inferno] http://www.xstarcraftx.net/
[7:51:11 PM] [Inferno] Checking for Bot Updates...
[7:51:11 PM] [Inferno] Current Version = 1.2.1174
[7:51:11 PM] [Inferno] Newest Public Version  = 1.2.1165
[7:51:11 PM] [Inferno] You are using a version that is not released.
[7:51:12 PM] [Inferno] BNLS Connecting
[7:51:12 PM] [Inferno] BNLS: Connected
[7:51:12 PM] Sent 0x0E
[7:51:12 PM] Recived 0x0E
[7:51:12 PM] Sent 0x0F
[7:52:16 PM] <Iarn> blah!
Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No

Spht

Quote from: Kk)Blaze(kK on June 21, 2004, 06:50 PM
When is it going to be removed? Soon I hope... ;D

NEVER!

Quote from: Kk)Blaze(kK on June 21, 2004, 06:50 PMbtw, Its still not responding...

[7:51:11 PM] [Inferno] InfernoBot 1.2.1174 By Kk)Blaze(kK
[7:51:11 PM] [Inferno] http://www.xstarcraftx.net/
[7:51:11 PM] [Inferno] Checking for Bot Updates...
[7:51:11 PM] [Inferno] Current Version = 1.2.1174
[7:51:11 PM] [Inferno] Newest Public Version  = 1.2.1165
[7:51:11 PM] [Inferno] You are using a version that is not released.
[7:51:12 PM] [Inferno] BNLS Connecting
[7:51:12 PM] [Inferno] BNLS: Connected
[7:51:12 PM] Sent 0x0E
[7:51:12 PM] Recived 0x0E
[7:51:12 PM] Sent 0x0F
[7:52:16 PM] <Iarn> blah!

Show us packet trace of the BNLS traffic.

Blaze

Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No

Falcon[anti-yL]


StepAside

I suppose if you send the packet with an ID that is not *supported* by BNLS, then you will not receive a response. If you're receiving a reponse for E, I don't think you're parsing the packet ID incorrectly. The best thing would be to see the trace, yes.

Blaze

well... you wanted it...


1  127.0.0.1:1205  127.0.0.1:1205  1  Send  
0000  21                                                 !

2  127.0.0.1:1205  127.0.0.1:1205  1  WSARecv  
0000  21                                                 !

3  127.0.0.1:1205  127.0.0.1:1205  1  Recv  
0000  21                                                 !

4  192.168.1.101:1209  66.185.95.103:80  231  Send  
0000  47 45 54 20 2F 6B 6B 62 6C 61 7A 65 6B 6B 2F 49    GET /kkblazekk/I
0010  6E 66 65 72 6E 6F 2F 76 65 72 73 69 6F 6E 2E 74    nferno/version.t
0020  78 74 20 48 54 54 50 2F 31 2E 31 0D 0A 41 63 63    xt HTTP/1.1..Acc
0030  65 70 74 3A 20 69 6D 61 67 65 2F 67 69 66 2C 69    ept: image/gif,i
0040  6D 61 67 65 2F 78 2D 78 62 69 74 6D 61 70 2C 69    mage/x-xbitmap,i
0050  6D 61 67 65 2F 6A 70 65 67 2C 69 6D 61 67 65 2F    mage/jpeg,image/
0060  70 6A 70 65 67 2C 2A 2F 2A 0D 0A 55 73 65 72 2D    pjpeg,*/*..User-
0070  41 67 65 6E 74 3A 20 4D 69 63 72 6F 73 6F 66 74    Agent: Microsoft
0080  20 55 52 4C 20 43 6F 6E 74 72 6F 6C 20 2D 20 36     URL Control - 6
0090  2E 30 30 2E 38 38 36 32 0D 0A 48 6F 73 74 3A 20    .00.8862..Host:
00A0  6D 65 6D 62 65 72 73 2E 72 6F 67 65 72 73 2E 63    members.rogers.c
00B0  6F 6D 0D 0A 43 6F 6E 6E 65 63 74 69 6F 6E 3A 20    om..Connection:
00C0  4B 65 65 70 2D 41 6C 69 76 65 0D 0A 43 61 63 68    Keep-Alive..Cach
00D0  65 2D 43 6F 6E 74 72 6F 6C 3A 20 6E 6F 2D 63 61    e-Control: no-ca
00E0  63 68 65 0D 0A 0D 0A                               che....

5  127.0.0.1:1205  127.0.0.1:1205  1  Send  
0000  21                                                 !

6  127.0.0.1:1205  127.0.0.1:1205  1  WSARecv  
0000  21                                                 !

7  127.0.0.1:1205  127.0.0.1:1205  1  Recv  
0000  21                                                 !

8  66.185.95.103:80  192.168.1.101:1209  275  WSARecv  
0000  48 54 54 50 2F 31 2E 31 20 32 30 30 20 4F 4B 0D    HTTP/1.1 200 OK.
0010  0A 44 61 74 65 3A 20 54 68 75 2C 20 32 34 20 4A    .Date: Thu, 24 J
0020  75 6E 20 32 30 30 34 20 30 30 3A 32 34 3A 30 32    un 2004 00:24:02
0030  20 47 4D 54 0D 0A 53 65 72 76 65 72 3A 20 41 70     GMT..Server: Ap
0040  61 63 68 65 0D 0A 4C 61 73 74 2D 4D 6F 64 69 66    ache..Last-Modif
0050  69 65 64 3A 20 53 75 6E 2C 20 30 36 20 4A 75 6E    ied: Sun, 06 Jun
0060  20 32 30 30 34 20 30 32 3A 35 38 3A 31 35 20 47     2004 02:58:15 G
0070  4D 54 0D 0A 45 54 61 67 3A 20 22 32 36 37 63 64    MT..ETag: "267cd
0080  2D 38 2D 34 30 63 32 38 38 34 37 22 0D 0A 41 63    -8-40c28847"..Ac
0090  63 65 70 74 2D 52 61 6E 67 65 73 3A 20 62 79 74    cept-Ranges: byt
00A0  65 73 0D 0A 43 6F 6E 74 65 6E 74 2D 4C 65 6E 67    es..Content-Leng
00B0  74 68 3A 20 38 0D 0A 4B 65 65 70 2D 41 6C 69 76    th: 8..Keep-Aliv
00C0  65 3A 20 74 69 6D 65 6F 75 74 3D 35 2C 20 6D 61    e: timeout=5, ma
00D0  78 3D 35 30 30 0D 0A 43 6F 6E 6E 65 63 74 69 6F    x=500..Connectio
00E0  6E 3A 20 4B 65 65 70 2D 41 6C 69 76 65 0D 0A 43    n: Keep-Alive..C
00F0  6F 6E 74 65 6E 74 2D 54 79 70 65 3A 20 74 65 78    ontent-Type: tex
0100  74 2F 70 6C 61 69 6E 0D 0A 0D 0A 31 2E 32 2E 31    t/plain....1.2.1
0110  31 36 35                                           165

9  66.185.95.103:80  192.168.1.101:1209  275  Recv  
0000  48 54 54 50 2F 31 2E 31 20 32 30 30 20 4F 4B 0D    HTTP/1.1 200 OK.
0010  0A 44 61 74 65 3A 20 54 68 75 2C 20 32 34 20 4A    .Date: Thu, 24 J
0020  75 6E 20 32 30 30 34 20 30 30 3A 32 34 3A 30 32    un 2004 00:24:02
0030  20 47 4D 54 0D 0A 53 65 72 76 65 72 3A 20 41 70     GMT..Server: Ap
0040  61 63 68 65 0D 0A 4C 61 73 74 2D 4D 6F 64 69 66    ache..Last-Modif
0050  69 65 64 3A 20 53 75 6E 2C 20 30 36 20 4A 75 6E    ied: Sun, 06 Jun
0060  20 32 30 30 34 20 30 32 3A 35 38 3A 31 35 20 47     2004 02:58:15 G
0070  4D 54 0D 0A 45 54 61 67 3A 20 22 32 36 37 63 64    MT..ETag: "267cd
0080  2D 38 2D 34 30 63 32 38 38 34 37 22 0D 0A 41 63    -8-40c28847"..Ac
0090  63 65 70 74 2D 52 61 6E 67 65 73 3A 20 62 79 74    cept-Ranges: byt
00A0  65 73 0D 0A 43 6F 6E 74 65 6E 74 2D 4C 65 6E 67    es..Content-Leng
00B0  74 68 3A 20 38 0D 0A 4B 65 65 70 2D 41 6C 69 76    th: 8..Keep-Aliv
00C0  65 3A 20 74 69 6D 65 6F 75 74 3D 35 2C 20 6D 61    e: timeout=5, ma
00D0  78 3D 35 30 30 0D 0A 43 6F 6E 6E 65 63 74 69 6F    x=500..Connectio
00E0  6E 3A 20 4B 65 65 70 2D 41 6C 69 76 65 0D 0A 43    n: Keep-Alive..C
00F0  6F 6E 74 65 6E 74 2D 54 79 70 65 3A 20 74 65 78    ontent-Type: tex
0100  74 2F 70 6C 61 69 6E 0D 0A 0D 0A 31 2E 32 2E 31    t/plain....1.2.1
0110  31 36 35                                           165

10  192.168.1.101:1210  63.161.183.202:9367  8  Send  
0000  08 00 0E 69 66 65 62 00                            ...ifeb.

11  63.161.183.202:9367  192.168.1.101:1210  7  WSARecv  
0000  07 00 0E 75 ED 4B 33                               ...u.K3

12  63.161.183.202:9367  192.168.1.101:1210  7  Recv  
0000  07 00 0E 75 ED 4B 33                               ...u.K3

13  192.168.1.101:1210  63.161.183.202:9367  12  Send  
0000  0C 00 0F 69 66 65 62 00 88 98 23 14                ...ifeb...#.

Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No

Spht

Quote from: Kk)Blaze(kK on June 23, 2004, 07:26 PM13  192.168.1.101:1210  63.161.183.202:9367  12  Send  
0000  0C 00 0F 69 66 65 62 00 88 98 23 14                ...ifeb...#.

You're only supposed to send the checksum in BNLS_AUTHORIZEPROOF (0x0f), not your Bot ID too.

Blaze

#12
I am not sending my bot id... unless I am doing something wrong and didn't notice it...

heres the packet I am sending once again....


Dim CheckSum As Long
       Dim key As Long, key2 As Long
       key2 = Functions.GetDWORD(Mid(data, 5, 4))
       key = BNLSChecksum(pass, key2)
Packet.InsertDWORD key
Packet.SendBPacket &HF

Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No

LordNevar

Looks proper too me, I don't see why your having a problem with it, unless your code is messed up somewhere else.

A good fortune may forbode a bad luck, which may in turn disguise a good fortune.
The greatest trick the Devil ever pulled, was convincing the world he didn't exsist.

Blaze

That why I am posting for support....
Quote
Mitosis: Haha, Im great arent I!
hismajesty[yL]: No