Terresquall Posted September 18, 2013 Posted September 18, 2013 Hello, I've recently gone into competitive Pokemon and started to use Pokecheck for a variety of purposes and I'm really impressed with what I saw, being a programmer myself. The thing that really blew me away was how Pokecheck could "intercept" transmissions to Nintendo WFC to receive Pokemon data. Does anyone know how its done? Also, for the official Nintendo hack checking Pokecheck tool, does Pokecheck query a specific IP address at a certain port to get the result?
Bond697 Posted September 18, 2013 Posted September 18, 2013 pokecheck queries pkvldtprod.nintendo.co.jp for the nintendo hack checking. as for the overall site, it's just the gts exploit that you'll see in other programs here mixed in with some other things that we worked on privately. e: well, https://pkvldtprod.nintendo.co.jp/pokemon/validate
Terresquall Posted September 18, 2013 Author Posted September 18, 2013 Thanks for your help. I found a couple of GTS exploit threads and I will let them take it from here Just one more thing: for the actual hack check, do you query the HTTP port with a post request? How do they tell you whether the hack check has been valid or not?
Bond697 Posted September 20, 2013 Posted September 20, 2013 i'm pretty sure that for the nintendo hack check, pokecheck pretends to be a game validating a pokemon and taking the result back from the validation server. how exactly we did that, i don't recall anymore because it was once about 2 years ago. we did a fair amount of disassembly, though.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now