Forums WoW Modding Support Archives WoWModding Support Archives [DiscordArchive] I have a question for local gurus I'm completely new to WoW emulation and client reverse engineeri

[DiscordArchive] I have a question for local gurus I'm completely new to WoW emulation and client reverse engineeri

[DiscordArchive] I have a question for local gurus I'm completely new to WoW emulation and client reverse engineeri

rektbyfaith
Administrator
0
06-17-2024, 07:59 PM
#1
Archived author: Val • Posted: 2024-06-17T19:59:44.685000+00:00
Original source

I have a question for local gurus I'm completely new to WoW emulation and client reverse engineering scene. I'm interested in reverse-engineering client/server protocol for latest classic clients 1.14 and later because I want to make it work with vmangos emulator without HermesProxy and preferably client patching as well. I see that google protobuf is being used and since it has a code generator, it seems like after each build there're changes in the so called "opcodes" or basically packet ids, which causes minor protocol changes. I also see that TrinityCore and CypherCore have some protobuff generated files, so they get the same data format as client is using but what about these opcodes - packet ids? Is is possible to extract them as well? Or was it always done manually with packet sniffing ? In theory it should be possible to get them from wow executable... has anyone here done that?
rektbyfaith
06-17-2024, 07:59 PM #1

Archived author: Val • Posted: 2024-06-17T19:59:44.685000+00:00
Original source

I have a question for local gurus I'm completely new to WoW emulation and client reverse engineering scene. I'm interested in reverse-engineering client/server protocol for latest classic clients 1.14 and later because I want to make it work with vmangos emulator without HermesProxy and preferably client patching as well. I see that google protobuf is being used and since it has a code generator, it seems like after each build there're changes in the so called "opcodes" or basically packet ids, which causes minor protocol changes. I also see that TrinityCore and CypherCore have some protobuff generated files, so they get the same data format as client is using but what about these opcodes - packet ids? Is is possible to extract them as well? Or was it always done manually with packet sniffing ? In theory it should be possible to get them from wow executable... has anyone here done that?

Recently Browsing
 1 Guest(s)
Recently Browsing
 1 Guest(s)