Login Key: 6303 Login Status: 3600150406cccccccc00000000cccccccccccccccc Server List: cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc07001506030000 Confirm Selection: 1c00150803cccccccccccccccccccccccccccccccccccccccccccccc loginpass
Login Key: 4103 Login Status: 360015040090000000080000000000000000000000 Server List: 00000000000000000000000000000000000000000000000000000000000000000013001506000c00010108576172686561 Confirm Selection: 640000070015420100000600154301001c0015080051c91a06846c88b0f7cde084d7eaffc61c1b037871f001 login2pass
def LSGetAuthKeys(self, sock : RFClient, packet : bytes): pluskey = ((unpack('B',packet[4:5])[0]+1) & 0xff) xorkey = ((unpack('B',packet[5:6])[0]+3) & 0xff) print("Recv Pluskey: " + str(pluskey) + ", Xorkey: " + str(xorkey)) outPass = pack(b'13s13s',self._userlogin,self._userpass) cryptedpass = b'' for i in outPass.decode('utf8'): cryptedpass += pack(b'B',(((ord(i)+pluskey) & 0xff) ^ xorkey)) packet = pack(b'HH26sB',0x1F,0x0315,cryptedpass,0) sock.sendBuffer += packet