yoko, the 407 stuff you asked me
Posted: 2005-01-10 03:42:01
client 4.0.7a dump (generated by UOCH)
please notice how the packet len is already formatted
==========================================
Dev dump: Client executable CRC32 93AE13D2
Dev dump: Client executable size 1DF000
Dev dump: Client time date stamp 41D9A612
Dev dump: Client image base 400000
Dev dump: Client entry point @13636B
Dev dump: Client version is 4.0.7a
Dev dump: Login encryption function @19880
Dev dump: Login encryption signature @198F9
Dev dump: Packet handler function @30070
Dev dump: Packet handler signature @3016F
Dev dump: Packet table found @194780
Dev dump: Last packet in client's table DC
==========================================
Time elapsed during analysis: 3255ms
please notice how the packet len is already formatted

==========================================
Dev dump: Client executable CRC32 93AE13D2
Dev dump: Client executable size 1DF000
Dev dump: Client time date stamp 41D9A612
Dev dump: Client image base 400000
Dev dump: Client entry point @13636B
Dev dump: Client version is 4.0.7a
Dev dump: Login encryption function @19880
Dev dump: Login encryption signature @198F9
Dev dump: Packet handler function @30070
Dev dump: Packet handler signature @3016F
Dev dump: Packet table found @194780
Code: Select all
static int PktLenTable[] =
{
/* 0x00 */ 0x0068, 0x0005, 0x0007, 0x8000, 0x0002, 0x0005, 0x0005, 0x0007, 0x000E, 0x0005, 0x000B, 0x0007, 0x8000, 0x0003, 0x8000, 0x003D,
/* 0x10 */ 0x00D7, 0x8000, 0x8000, 0x000A, 0x0006, 0x0009, 0x0001, 0x8000, 0x8000, 0x8000, 0x8000, 0x0025, 0x8000, 0x0005, 0x0004, 0x0008,
/* 0x20 */ 0x0013, 0x0008, 0x0003, 0x001A, 0x0007, 0x0014, 0x0005, 0x0002, 0x0005, 0x0001, 0x0005, 0x0002, 0x0002, 0x0011, 0x000F, 0x000A,
/* 0x30 */ 0x0005, 0x0001, 0x0002, 0x0002, 0x000A, 0x028D, 0x8000, 0x0008, 0x0007, 0x0009, 0x8000, 0x8000, 0x8000, 0x0002, 0x0025, 0x8000,
/* 0x40 */ 0x00C9, 0x8000, 0x8000, 0x0229, 0x02C9, 0x0005, 0x8000, 0x000B, 0x0049, 0x005D, 0x0005, 0x0009, 0x8000, 0x8000, 0x0006, 0x0002,
/* 0x50 */ 0x8000, 0x8000, 0x8000, 0x0002, 0x000C, 0x0001, 0x000B, 0x006E, 0x006A, 0x8000, 0x8000, 0x0004, 0x0002, 0x0049, 0x8000, 0x0031,
/* 0x60 */ 0x0005, 0x0009, 0x000F, 0x000D, 0x0001, 0x0004, 0x8000, 0x0015, 0x8000, 0x8000, 0x0003, 0x0009, 0x0013, 0x0003, 0x000E, 0x8000,
/* 0x70 */ 0x001C, 0x8000, 0x0005, 0x0002, 0x8000, 0x0023, 0x0010, 0x0011, 0x8000, 0x0009, 0x8000, 0x0002, 0x8000, 0x000D, 0x0002, 0x8000,
/* 0x80 */ 0x003E, 0x8000, 0x0002, 0x0027, 0x0045, 0x0002, 0x8000, 0x8000, 0x0042, 0x8000, 0x8000, 0x8000, 0x000B, 0x8000, 0x8000, 0x8000,
/* 0x90 */ 0x0013, 0x0041, 0x8000, 0x0063, 0x8000, 0x0009, 0x8000, 0x0002, 0x8000, 0x001A, 0x8000, 0x0102, 0x0135, 0x0033, 0x8000, 0x8000,
/* 0xa0 */ 0x0003, 0x0009, 0x0009, 0x0009, 0x0095, 0x8000, 0x8000, 0x0004, 0x8000, 0x8000, 0x0005, 0x8000, 0x8000, 0x8000, 0x8000, 0x000D,
/* 0xb0 */ 0x8000, 0x8000, 0x8000, 0x8000, 0x8000, 0x0040, 0x0009, 0x8000, 0x8000, 0x0003, 0x0006, 0x0009, 0x0003, 0x8000, 0x8000, 0x8000,
/* 0xc0 */ 0x0024, 0x8000, 0x8000, 0x8000, 0x0006, 0x00CB, 0x0001, 0x0031, 0x0002, 0x0006, 0x0006, 0x0007, 0x8000, 0x0001, 0x8000, 0x004E,
/* 0xd0 */ 0x8000, 0x0002, 0x0019, 0x8000, 0x8000, 0x8000, 0x8000, 0x8000, 0x8000, 0x010C, 0x8000, 0x8000, 0x0009, 0x0000, 0x0000, 0x0000,
/* 0xe0 */ 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000,
/* 0xf0 */ 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000
};
Dev dump: Last packet in client's table DC
==========================================
Time elapsed during analysis: 3255ms