Closed Techbrunch closed 8 years ago
Yeah thanks :) I already found this!
I'm just super curious about the method how these were reverse engineered from The protobuf messages or were these just leaked from The creators of the game?
They just kind of appeared.
Had to be some sort of leak, I don't think it would be possible to decode them this quickly.
On Jul 16, 2016 1:48 PM, "Onni Hakala" notifications@github.com wrote:
I'm just super curious about the method how these were reverse engineered from The protobuf messages or were these just leaked from The creators of the game?
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/tejado/pokemongo-api-demo/issues/3#issuecomment-233142379, or mute the thread https://github.com/notifications/unsubscribe-auth/ALh7xB7C0fsjV2HhVgcly4lGjwoTTDt8ks5qWRmFgaJpZM4JMQgC .
@onnimonni it's rather easy to get the basics. Fire up mitmproxy with protobuf decoding, and it'll show you how to formulate a request and a response. The contents are harder, as they're not done the usual protobuf way (the same field can have multiple types, like a union, protobuf recommends optional
).
Then extrapolate from there :).
This might help: