Studying the packet data
Moderator: Team Members
- Gangrenous
- Posts: 812
- Joined: Sun Apr 24, 2016 6:54 am
- Characters: Dinsmoor
Studying the packet data
So if I want to study the packet data, what actually gets sent back and forth. How does one go about this properly? Do we have something better than just using wireshark? Can anyone give me a quick paragraph or two description on how you do it?
Resident Dirty Hippy
- Ememjr
- Team Member
- Posts: 975
- Joined: Wed Mar 15, 2017 9:41 am
- EQ2Emu Server: Perseverance
- Gangrenous
- Posts: 812
- Joined: Sun Apr 24, 2016 6:54 am
- Characters: Dinsmoor
Re: Studying the packet data
You do not have the required permissions to view the files attached to this post.
Resident Dirty Hippy
-
tyrbo
- Team Member
- Posts: 271
- Joined: Thu Feb 18, 2016 12:33 pm
Re: Studying the packet data
http://wiki.swganh.org/index.php/SOE_Protocol_Breakdown has a nice breakdown of how things more or less work.
https://github.com/Joshsora/LibSOE is a C# implementation (may not work for EQ2, never tested, but it looks close as well).
I have a networking implementation for DBG as well in Rust, but it's not publicly available.
There are some differences, but it's pretty close. I've never seen channels 1 through 3 utilized at all as far as EQ2 goes, so you can probably disregard those.
Going by that, you should be able to make some sense of what you're seeing in Wireshark, although the actual application packets are encrypted (seen in 0x09, 0x0D, 0x19, as well as 0x03 (which can contain a mix of encrypted/unencrypted)).
There is a packet analyzer which I believe is available on the public svn.
The collector is not publicly available, so you'll either have to get a copy, or find the old source it was built on top of (doable), or build your own based on the World source.
https://github.com/Joshsora/LibSOE is a C# implementation (may not work for EQ2, never tested, but it looks close as well).
I have a networking implementation for DBG as well in Rust, but it's not publicly available.
There are some differences, but it's pretty close. I've never seen channels 1 through 3 utilized at all as far as EQ2 goes, so you can probably disregard those.
Going by that, you should be able to make some sense of what you're seeing in Wireshark, although the actual application packets are encrypted (seen in 0x09, 0x0D, 0x19, as well as 0x03 (which can contain a mix of encrypted/unencrypted)).
There is a packet analyzer which I believe is available on the public svn.
The collector is not publicly available, so you'll either have to get a copy, or find the old source it was built on top of (doable), or build your own based on the World source.
Who is online
Users browsing this forum: No registered users and 1 guest