Welcome to Open Carnage

A resource for gamers and technology enthusiasts, with unique means of rewarding content creation and support. Have a wander to see why we're worth the time!

Java

Member
  • Content count

    26
  • Joined

  • Last visited

  • Raffle Tickets

    5

1 Follower

About Java

  • Birthday 10/01/1984

Extra Information

  • Gender
    Male
  • Contributed
    $50 (US) to Open Carnage

Contact Methods

Recent Profile Visitors

897 profile views
  1. Posting this here till I figure out other things.

     

    EXE is patched to run single core only, extended memory limits (could still be restricted), and run while not in foreground.

    haloce.7z

  2. Oh Sonic Mayhem
  3. Updated with some more screenshots

  4. Actually I would stay away from doing this, you will more and likely make the other players annoyed broadcasting this. BK servers do this, and it just floods the crap out of their server chat with the implementation they utilized.
  5. Just for clarification due to someone asking, the "Wireshark" filter is only for traffic with the XOR encryption/decryption. The enctypeX encryption/decryption is utilized to break out the master server query.
  6. Just an fyi, these are the only keys you can use to make queries on this one hosted by Bungie. You will fully understand the usage of these, if and when you read the documentation. Description gamename gamekey ===================================================================== Halo Beta halo QW88cv Halo Demo halod yG3d9w Halo: Combat Evolved halor e4Rd9J Halo Multiplayer Expansion halom e4Rd9J
  7. Web Resources GameSpy SDK Documentaion Help Luigi Auriemma GameSpy Research OpenSpy -Soneek- (Original Github) OpenSpy -Masaq- (Current Github) Downloadable Resources Gamespy OpenSDK v1.00 w/GameSpy SDK Documentation Help Wireshark GameSpy (XOR) Lua Filter OpenSpy Source -Soneek- OpenSpy Source -Masaq-
  8. That is actual bug with HAC2 and lastest build of WIN10 atm. Although do not know if anyone is actually looking into it.
  9. Basically type "cmd" the search thing aka Cortana in the bar. Should populate almost immediately. Also might wanna try deleting the cache.hac and preferences.ini inside your Documents/My Games/Halo CE/hac folder
  10. Also be a good idea to see if he can even ping 72.69.223.155. If he is able to get a reply, it might be an DNS resolver issue on his end which could be difficult to figure out.
  11. Code for a Lua Script to Decrypt XOR Traffic in Wireshark. Also could be useful else were if needed. -- Wireshark LUA script to handle Gamespy Packets trivial_proto = Proto("gamespy","Gamespy Protocol") -- XOR Cipher: local tab = { -- tab[i][j] = xor(i-1, j-1) {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, }, {1, 0, 3, 2, 5, 4, 7, 6, 9, 8, 11, 10, 13, 12, 15, 14, }, {2, 3, 0, 1, 6, 7, 4, 5, 10, 11, 8, 9, 14, 15, 12, 13, }, {3, 2, 1, 0, 7, 6, 5, 4, 11, 10, 9, 8, 15, 14, 13, 12, }, {4, 5, 6, 7, 0, 1, 2, 3, 12, 13, 14, 15, 8, 9, 10, 11, }, {5, 4, 7, 6, 1, 0, 3, 2, 13, 12, 15, 14, 9, 8, 11, 10, }, {6, 7, 4, 5, 2, 3, 0, 1, 14, 15, 12, 13, 10, 11, 8, 9, }, {7, 6, 5, 4, 3, 2, 1, 0, 15, 14, 13, 12, 11, 10, 9, 8, }, {8, 9, 10, 11, 12, 13, 14, 15, 0, 1, 2, 3, 4, 5, 6, 7, }, {9, 8, 11, 10, 13, 12, 15, 14, 1, 0, 3, 2, 5, 4, 7, 6, }, {10, 11, 8, 9, 14, 15, 12, 13, 2, 3, 0, 1, 6, 7, 4, 5, }, {11, 10, 9, 8, 15, 14, 13, 12, 3, 2, 1, 0, 7, 6, 5, 4, }, {12, 13, 14, 15, 8, 9, 10, 11, 4, 5, 6, 7, 0, 1, 2, 3, }, {13, 12, 15, 14, 9, 8, 11, 10, 5, 4, 7, 6, 1, 0, 3, 2, }, {14, 15, 12, 13, 10, 11, 8, 9, 6, 7, 4, 5, 2, 3, 0, 1, }, {15, 14, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0, }, } function bxor (a,b) local res, c = 0, 1 while a > 0 and b > 0 do local a2, b2 = a % 16, b % 16 res = res + tab[a2+1][b2+1]*c a = (a-a2)/16 b = (b-b2)/16 c = c*16 end res = res + a*c + b*c return res end -- Apply the "gamespy xor" to the packet function trivial_proto.dissector(buffer,pinfo,tree) pinfo.cols.protocol = "Gamespy" -- Symmetric cipher used to encrypt/decrypt cipher = {103, 97, 109, 101, 115, 112, 121} index = 1 decoded = "" size = buffer:len() -- Apply XOR cipher and save the decoded string for i=0,size-1 do thebyte = bxor(buffer(i,1):uint(), cipher[index]) decoded = decoded .. string.char(thebyte) index = index + 1 if index == 8 then index = 1 end end -- Make wireshark display our results local subtree = tree:add(trivial_proto,buffer(),"Gamspy Protocol") subtree:add(buffer(0,size), "Decoded: " .. decoded) end -- load the udp.port table udp_table = DissectorTable.get("udp.port") -- register our protocol to handle udp port 7777 -- more and likely need to add the specific port -- to decrypt the traffic from/to -- Example: Halo PC/CE 2302 udp_table:add(29910,trivial_proto) udp_table:add(2302,trivial_proto) Copy file attached into your Wireshark install folder. Make additions/edits for ports needed to decrypt {udp_table:add(port,trivial_proto)} Add dofile("gamespy.lua") to your init.lua that resides in your Wireshark install folder. Should be good to go gamespy.lua
  12. So basically some key things to know with the Gamespy stuff with the current setup gamename: halor (Retail Release)(PC) or halom (Multiplayer Extension)(CE) {this is needed to grab the particular listing for what game} msgamename: halor or halom {either or works for making the query} msgamekey: e4Rd9J {needed for the xor} Some additional things can be used if you study Luigi Auriemma work. But these are required with the XOR Ciper to pull it out successfully. But I will help when I can danielpz