Closed Dampfkraft closed 9 years ago
It did not change. Do you still skip the length of the 'whole' new key?
Do you read the new nonce as array of bytes of a string? Try usinf array of bytes as a string can fuck up bytes.
Goodluck!
Op 16 mei 2015 om 03:12 heeft Dampfkraft notifications@github.com het volgende geschreven:
Im able to decipher the Login & Encryption packet with basekey + "nonce", however, after generating the new nonce im only getting rubbish. Since the rc4 algorithm seems to work the blame is on the nonce scrambler. But im not skilled enough to verify this, any ideas?
— Reply to this email directly or view it on GitHub.
I got it working using c#, but I cant seem to get it working using python (using 3.4)... well, only my python skills to blame ;-)
Im able to decipher the Login & Encryption packet with basekey + "nonce", however, after generating the new nonce im only getting rubbish. Since the rc4 algorithm seems to work the blame is on the nonce scrambler. But im not skilled enough to verify this, any ideas?