CONNECT Packet - zeroKilo/GROBackendWV GitHub Wiki

CONNECT Packet

this packet is the second UDP packet a client sends. Its used to give the server an ID, which he will use for all future packets as signature ID. in the connection to the secure server this packet also contains a payload. This payload is a kerberos ticket aquired from the authentication/redirector server.

Example Packet Exchange with Authentication Server

`

09.11.2019 18:47:44 : [UDP Redirector] received : 3F 31 31 1F 78 56 34 12 01 00 01 00 26 7F 5E 
09.11.2019 18:47:44 : [UDP Redirector] received : UDPPacket {
	From         : VPort[port=15 type=OldRVSec]
	To           : VPort[port=01 type=OldRVSec]
	Flags        : [FLAG_RELIABLE][FLAG_NEED_ACK]
	Type         : CONNECT
	Session ID   : 0x1F
	Signature    : 0x12345678
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x7F260001
	PayLoad      : 
	Checksum     : 0x5E
}

09.11.2019 18:47:44 : [UDP Redirector] received : UDPPacket { CONNECT ( R W  )}
09.11.2019 18:47:44 : [UDP Redirector] send : 31 3F 09 1F 01 00 26 7F 01 00 78 56 34 12 36 
09.11.2019 18:47:44 : [UDP Redirector] send : UDPPacket {
	From         : VPort[port=01 type=OldRVSec]
	To           : VPort[port=15 type=OldRVSec]
	Flags        : [FLAG_ACK]
	Type         : CONNECT
	Session ID   : 0x1F
	Signature    : 0x7F260001
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x12345678
	PayLoad      : 
	Checksum     : 0x36
}

09.11.2019 18:47:44 : [UDP Redirector] send : UDPPacket { CONNECT (  A   )}`

Example Packet Exchange with Secure Server

`

09.11.2019 18:47:45 : [UDP Main] received : 3F 31 31 B6 78 56 34 12 01 00 01 00 27 7F 0F A3 44 DB 13 89 0D 1B A3 83 F7 2E D9 8C 7E CB D8 5B 3F 46 6D 77 AC F1 F5 AD D6 95 1F 1B 56 5A 7E 92 AB 6D C4 AE 63 8B FA F3 AB E5 3C 9E C1 E4 2B 0D F8 C0 F7 C9 A6 25 82 06 65 E8 59 5A E3 AE 51 99 A1 E7 2E 62 31 84 A6 47 
09.11.2019 18:47:45 : [UDP Main] received : UDPPacket {
	From         : VPort[port=15 type=OldRVSec]
	To           : VPort[port=01 type=OldRVSec]
	Flags        : [FLAG_RELIABLE][FLAG_NEED_ACK]
	Type         : CONNECT
	Session ID   : 0xB6
	Signature    : 0x12345678
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x7F270001
	PayLoad      : 24 00 00 00 76 21 4B A6 21 96 D3 F3 9A 8C 7A 27 0D D9 B3 FA 21 0E ED AF 42 63 92 95 C1 16 54 08 EE 6E 69 17 35 78 2E 6E 1C 00 00 00 CB 5A 43 29 B9 69 D4 4C 00 3A E4 90 B1 87 73 C7 23 0F 93 1A 21 7E BC 80 3F 95 4E C3 
	Checksum     : 0x47
}

09.11.2019 18:47:45 : [UDP Main] received : UDPPacket { CONNECT ( R W  )}
09.11.2019 18:47:45 : Got response code 0xE2450886
09.11.2019 18:47:45 : [UDP Main] send : 31 3F 09 B6 01 00 27 7F 01 00 78 56 34 12 0E FF D8 B8 72 9F 4C 38 E2 D2 1C F9 2A 15 3A B0 44 3B 
09.11.2019 18:47:45 : [UDP Main] send : UDPPacket {
	From         : VPort[port=01 type=OldRVSec]
	To           : VPort[port=15 type=OldRVSec]
	Flags        : [FLAG_ACK]
	Type         : CONNECT
	Session ID   : 0xB6
	Signature    : 0x7F270001
	Sequence ID  : 0x0001
	Conn. Sig.   : 0x12345678
	PayLoad      : 04 00 00 00 87 08 45 E2 
	Checksum     : 0x3B
}

09.11.2019 18:47:45 : [UDP Main] send : UDPPacket { CONNECT (  A   )}`