A reverse engineered packet cryptography - encryption and decryption routines to emulate NosTale client or server.
The goal of this project is to recreate an algorithm that is used to encrypt/decrypt net packets that are exchanged between NosTale client and server. I've seen many public cryptos but I think none of them were producing exactly the same output as real client or server (especially when it comes to special characters like ąśżź
etc). The problem of a majority of those libraries is an incorrect mask generation algorithm. If you ever encounter output produced by this library that is different from the original produced by game client or server, please report it immediately.
Please use pypi to install this library:
pip install noscrypto
Unit tests are available under noscrypto/tests
All the functions accept bytes
as input and return bytes
as output. Keep in mind that each function should accept and output only single packet. It is extremely important when you are, for example decrypting world packets as a client, because sometime the server sends multiple packets in one call (they are splited by 0xFF, and you should decrypt the packets chunk by chunk)
Functions can be imported like
from noscrypto import Client
Encrypts your packet so the login server can read it. Automatically adds the \n
character at the end of packet if not present.
>>> Client.LoginEncrypt("hey".encode("ascii"))
b'\xba\xb5\xc9\xd8'
Decrypts your login result packet, so you can read it
>>> Client.LoginDecrypt(b'\x75\x70\x78\x7B\x72\x2F\x44\x19').decode("ascii")
'failc 5\n'
Encrypts your pakcet so the world server can read it. Beside packet
you also need to supply your session
(that one you received from login server). The last parameter is_first_packet
(default False
) must be set to True
only if you are sending your first packet to the world server (the session packet)
>>> Client.WorldEncrypt("hey!".encode("ascii"), 1337, False)
b'}\x10\x13\xffWx'
Decrypts your wolrd packet sent by server, so you can read it
>>> Client.WorldDecrypt(b'\x04\x8C\x8B\x9E\x8B\x96\x16\x65\x16\x65\x1A\x41\xA4\x14\x15\x46\x8E\xFF')
b'stat 221 221 60 60 0 1024\n'
Functions can be imported like
from noscrypto import Server
Encrypts your packet so the client can read it. Automatically adds the \n
character at the end of packet if not present.
>>> Server.LoginEncrypt("hello world".encode("ascii"))
b'wt{{~/\x86~\x81{s\x19'
Decrypts login packet from client, so you can read it
>>> Server.LoginDecrypt(b'\xba\xb5\xc9\xd8').decode("ascii")
'hey\n'
Encrypt world packet, so the client can read it
>>> Server.WorldEncrypt("stat 221 221 60 60 0 1024\n".encode("ascii"))
b'\x04\x8c\x8b\x9e\x8b\x96\x16e\x16e\x1aA\xa4\x14\x15F\x8e\xff'
Decrypts client pakcet so the world server can read it. Beside packet
you also need to supply client session
. The last parameter is_first_packet
(default False
) must be set to True
only if you didn't recv the first packet from client yet (the session packet).
>>> Server.WorldDecrypt(b'}\x10\x13\xffWx', 1337, False).decode("ascii")
'hey!'