Jump to content

Zaneris

Member
  • Posts

    8
  • Joined

  • Last visited

Reputation

10 Good

About Zaneris

  • Birthday 11/09/1986
  1. I've been collecting 0 data packets to look for some that match in checksum, and found some that in fact do... The only thing differing between the ones that are different is part of the header. ead001000000a1af93008c0004008b3d086c8d37bfd2bc9e556f8373ddfc ead001000000a1af93008c0004008b3d086c8d37bfd2bc9e556f8373ddfc ead001000000a1af93008c0004008b3d086c8d37bfd2bc9e556f8373ddfc ead001000000a1af9300ff000400a80cb50b2df825c4a1d19890bba72157 ead001000000a1af9300ff000400a80cb50b2df825c4a1d19890bba72157 ead001000000a1af9300ff000400a80cb50b2df825c4a1d19890bba72157 ead001000000a1af930093000400a9e5d4be3da3e2b0e472e027f16e45ff ead001000000a1af930093000400a9e5d4be3da3e2b0e472e027f16e45ff ead001000000a1af930093000400a9e5d4be3da3e2b0e472e027f16e45ff ead001000000a1af9300020004003d87795e6cad682c430d8751f79fc0f0 ead001000000a1af9300020004003d87795e6cad682c430d8751f79fc0f0 ead001000000a1af9300020004003d87795e6cad682c430d8751f79fc0f0 ead001000000a1af930040000400b8f17af75971928c461bea59a847cbef ead001000000a1af930040000400b8f17af75971928c461bea59a847cbef ead001000000a1af930040000400b8f17af75971928c461bea59a847cbef ead001000000a1af930088000400a480a844a2bab1c1d79bafa9aeefc327 ead001000000a1af930088000400a480a844a2bab1c1d79bafa9aeefc327 I logged off and on again to reset the packet ID, and that's how I got matching packets.
  2. This is my thought... but with what?
  3. The only thing I'm missing from getting the Wonder Trade to work is the checksum 16 bytes checksum within the EAD header. Any ideas? EAD header: uint magic; //0x0301D0EA // EA D0 01 03 ushort size; // without EAD header ushort unk1; // wondertrade: 0x1111, gts = 0xAFA1 ushort unk2; // wondertrade: 0x08E2, gts = 0x00E2 ushort unk3; ushort packetId; ubyte checksum[16]; ushort unk4; // 02 01 ubyte encryptedFlag; // 00 = plaintext (wondertrade), 01 = encrypted (gts) Data: ubyte data; if it's wondertrade: byte unk[0x1C]; byte pkx[0xE8]; Otherwise, the actual injection part is easy.
  4. No, not an issue with broadcasting, it just seems like virtual adapter traffic isn't passing through the WPF, or it's missing from the API. If it's possible to do what I'm trying to do, I'll have a working example by the end of tonight, if not.. Hopefully one of these skilled gentlemen come up with something releaseable
  5. Thats alright, I haven't even been able to test messing with the packet yet because for some reason I can see the exchange take place within wireshark, but then it doesn't ever seem to pass through windivert... My conclusion is that the 3DS packets while just being regular UDP somehow don't pass through WPF (unlikely), or it's due to my setup and using a virtual adapter to broadcast (more likely). Gonna dig up an old router today and see if I have more success.
  6. Aha! Yeah, I've managed to extract the pokemon from the packet and decrypt them. The pokemon itself is the 232 bytes from offset 0x3d -> 0x124 (within the data portion of the packet). Last step is to try and stick my own pokemon in the receiving end of the wonder trade and see how it goes. Loved your nickname for the gible by the way
  7. Here are the Wonder Trade packets if anyone else is interested. Sent:
×
×
  • Create New...