Thread: Client Refactoring

Results 1 to 5 of 5
  1. #1 Client Refactoring 
    Extreme Donator


    Join Date
    Jul 2009
    Age
    27
    Posts
    4,351
    Thanks given
    826
    Thanks received
    1,239
    Rep Power
    1781
    Normally I can figure stuff out by myself, but I'm stumped on this. I'm refactoring a 534 client, and I'm not sure how I'm supposed to refactor the methods in Jagex's Buffer when the obfuscator made it impossible read. I've tried finding the inverse for it but I can't.

    Code:
    			this.payload[this.pos++] = (byte) (val >> 1306587288);
    			this.payload[this.pos++] = (byte) (val >> -1386992368);
    			this.payload[this.pos++] = (byte) (val >> 462144872);
    			this.payload[this.pos++] = (byte) val;
    Now I know from testing that, that's writeInt

    Code:
    byte >> 24
    byte >> 16
    byte >> 8
    byte
    but the numbers are different for all other methods.

    You can find my GitHub here, for what I'm currently working on.
    Reply With Quote  
     

  2. #2  


    Major's Avatar
    Join Date
    Jan 2011
    Posts
    2,997
    Thanks given
    1,293
    Thanks received
    3,556
    Rep Power
    5000
    Client obfuscation as lshl/lshr/lushr and their int variants wrap around. You can derive the original value by ANDing the modified value by 31 for integers, or 63 for longs.

    Edit: here's code written by master client hacker jacmob http://pastie.org/pastes/824985
    Last edited by Major; 04-01-2015 at 05:53 PM.
    Reply With Quote  
     

  3. #3  
    Номер 1


    Leanbow's Avatar
    Join Date
    Feb 2008
    Posts
    5,895
    Thanks given
    1,564
    Thanks received
    2,624
    Rep Power
    5000
    http://www.rune-server.org/programmi...implifier.html a lot of posts explain there how to reverse
    Reply With Quote  
     

  4. #4  
    Extreme Donator


    Join Date
    Jul 2009
    Age
    27
    Posts
    4,351
    Thanks given
    826
    Thanks received
    1,239
    Rep Power
    1781
    Quote Originally Posted by Major View Post
    Client obfuscation as lshl/lshr/lushr wrap around. You can derive the original value by ANDing the modified value by 31 for integers, or 63 for longs.

    Edit: here's code written by master client hacker jacmob #824985 - Pastie
    Thank you Sir.

    You can find my GitHub here, for what I'm currently working on.
    Reply With Quote  
     

  5. #5  
    Registered Member
    Join Date
    Sep 2013
    Posts
    105
    Thanks given
    13
    Thanks received
    28
    Rep Power
    10
    It is because you are shifting an integer, so the bits can only be shifted by a max of 32.
    So for this example, do 1306587288 % 32, gives 24. -1386992368 % 32 is 16. 462144872 % 32 is 8.

    edit... fail. This is what I get for opening a page and then going back to read and answer it later...
    Reply With Quote  
     


Thread Information
Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)


User Tag List

Similar Threads

  1. New RS Client Refactoring Team
    By Micah in forum Requests
    Replies: 6
    Last Post: 01-13-2013, 06:34 AM
  2. Replies: 57
    Last Post: 07-20-2012, 08:20 PM
  3. Replies: 0
    Last Post: 06-02-2010, 03:08 AM
  4. [527] Client Refactored
    By T X in forum Downloads
    Replies: 10
    Last Post: 01-14-2009, 01:52 AM
  5. [req]Adding models for refactored clients[/req]
    By Cup-o-cino in forum Tutorials
    Replies: 1
    Last Post: 04-28-2008, 12:45 AM
Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •