[DiscordArchive] I have a question for local gurus I'm completely new to WoW emulation and client reverse engineeri
[DiscordArchive] I have a question for local gurus I'm completely new to WoW emulation and client reverse engineeri
Archived author: Val • Posted: 2024-06-17T19:59:44.685000+00:00
Original source
I have a question for local gurus I'm completely new to WoW emulation and client reverse engineering scene. I'm interested in reverse-engineering client/server protocol for latest classic clients 1.14 and later because I want to make it work with vmangos emulator without HermesProxy and preferably client patching as well. I see that google protobuf is being used and since it has a code generator, it seems like after each build there're changes in the so called "opcodes" or basically packet ids, which causes minor protocol changes. I also see that TrinityCore and CypherCore have some protobuff generated files, so they get the same data format as client is using but what about these opcodes - packet ids? Is is possible to extract them as well? Or was it always done manually with packet sniffing ? In theory it should be possible to get them from wow executable... has anyone here done that?