it's Packet Tokenizer: 006B as detailed

and I found that someone has bypassed it already.
from this thread http://forums.openkore.com/viewtopic.php?f=9&t=211359
I have sent him e-mail and guess what ? yes, no one replied. and Im not allowed to reply that thread also.
I have tried to use
Code: Select all
Key1 = 0x01581359 conversion -> 22549337
Key2 = 0x452d6ffa conversion -> 1160605690
Key3 = 0x6afb6e2e conversion -> 1794862638
Code: Select all
$self->cryptKeys(22549337, 1794862638, 1160605690)
please let me know if you need more information.
Thanks in advance.
Code: Select all
[Emperium]
ip 45.64.187.31
port 35041
master_version 30
version 7
serverType kRO_RagexeRE_2012_04_10a
addTableFolders kRO
charBlockSize 144
recvpackets recv.txt