CONNECT Packet - zeroKilo/GROBackendWV GitHub Wiki

CONNECT Packet

This packet is the second UDP packet a client sends. Its used to give the server an ID, which it will use for all future packets as signature ID. While connecting to the secure server, this packet also contains a payload with the kerberos ticket acquired from the authentication/redirector server.

Example packet exchange with Authentication Server

09.11.2019 18:47:44 : [UDP Redirector] received : 3F 31 31 1F 78 56 34 12 01 00 01 00 26 7F 5E 
09.11.2019 18:47:44 : [UDP Redirector] received : UDPPacket {
	From         : VPort[port=15 type=OldRVSec]
	To           : VPort[port=01 type=OldRVSec]
	Flags        : [FLAG_RELIABLE][FLAG_NEED_ACK]
	Type         : CONNECT
	Session ID   : 0x1F
	Signature    : 0x12345678
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x7F260001
	PayLoad      : 
	Checksum     : 0x5E
}

09.11.2019 18:47:44 : [UDP Redirector] received : UDPPacket { CONNECT ( R W  )}
09.11.2019 18:47:44 : [UDP Redirector] send : 31 3F 09 1F 01 00 26 7F 01 00 78 56 34 12 36 
09.11.2019 18:47:44 : [UDP Redirector] send : UDPPacket {
	From         : VPort[port=01 type=OldRVSec]
	To           : VPort[port=15 type=OldRVSec]
	Flags        : [FLAG_ACK]
	Type         : CONNECT
	Session ID   : 0x1F
	Signature    : 0x7F260001
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x12345678
	PayLoad      : 
	Checksum     : 0x36
}

09.11.2019 18:47:44 : [UDP Redirector] send : UDPPacket { CONNECT (  A   )}

Example packet exchange with Secure Server

09.11.2019 18:47:45 : [UDP Main] received : 3F 31 31 B6 78 56 34 12 01 00 01 00 27 7F 0F A3 44 DB 13 89 0D 1B A3 83 F7 2E D9 8C 7E CB D8 5B 3F 46 6D 77 AC F1 F5 AD D6 95 1F 1B 56 5A 7E 92 AB 6D C4 AE 63 8B FA F3 AB E5 3C 9E C1 E4 2B 0D F8 C0 F7 C9 A6 25 82 06 65 E8 59 5A E3 AE 51 99 A1 E7 2E 62 31 84 A6 47 
09.11.2019 18:47:45 : [UDP Main] received : UDPPacket {
	From         : VPort[port=15 type=OldRVSec]
	To           : VPort[port=01 type=OldRVSec]
	Flags        : [FLAG_RELIABLE][FLAG_NEED_ACK]
	Type         : CONNECT
	Session ID   : 0xB6
	Signature    : 0x12345678
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x7F270001
	PayLoad      : 24 00 00 00 76 21 4B A6 21 96 D3 F3 9A 8C 7A 27 0D D9 B3 FA 21 0E ED AF 42 63 92 95 C1 16 54 08 EE 6E 69 17 35 78 2E 6E 1C 00 00 00 CB 5A 43 29 B9 69 D4 4C 00 3A E4 90 B1 87 73 C7 23 0F 93 1A 21 7E BC 80 3F 95 4E C3 
	Checksum     : 0x47
}

09.11.2019 18:47:45 : [UDP Main] received : UDPPacket { CONNECT ( R W  )}
09.11.2019 18:47:45 : Got response code 0xE2450886
09.11.2019 18:47:45 : [UDP Main] send : 31 3F 09 B6 01 00 27 7F 01 00 78 56 34 12 0E FF D8 B8 72 9F 4C 38 E2 D2 1C F9 2A 15 3A B0 44 3B 
09.11.2019 18:47:45 : [UDP Main] send : UDPPacket {
	From         : VPort[port=01 type=OldRVSec]
	To           : VPort[port=15 type=OldRVSec]
	Flags        : [FLAG_ACK]
	Type         : CONNECT
	Session ID   : 0xB6
	Signature    : 0x7F270001
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x12345678
	PayLoad      : 04 00 00 00 87 08 45 E2 
	Checksum     : 0x3B
}

09.11.2019 18:47:45 : [UDP Main] send : UDPPacket { CONNECT (  A   )}