Jump to content

Search the Community

Showing results for tags '468'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • RuneLocus
    • News & Announcements
    • Information Booth
    • Website Support
    • Introductions
    • Chat
    • Forum Games
  • RuneScape Development
    • RSPS General
    • RuneScape Private Server (RS2)
    • RuneScape Private Server (503+)
    • RuneScape Private Server (EoC 742+)
  • Other
    • Digital Art
    • Gaming
    • Webdevelopment
    • Computers
  • Marketplace
    • RuneScape Market
    • RSPS Market
    • Others Market
    • Freelance Middleman Services
  • Super Secret Club's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Found 2 results

  1. [CENTER] Hello, at first me and snake were using this client back from 2007 and loading the osrs cache revision 2 [U][B]Package Includes[/B][/U] Cache 1k+ working revision xtea(not randomized object update) Client Renamed Link: [url]http://up.ht/1fAu3rg[/url] [IMG]http://i.imgur.com/67DbOfP.png[/IMG] [IMG]http://i.imgur.com/Z0QVV6Q.png[/IMG] Note: this was my first acutal client i renamed with little help from snake credits james snake Note: We are going to update our project to the newest osrs cache when gwd wars releases [/CENTER]
  2. This is the current OldSchool RuneScape client, this will also dump XTEA keys. [COLOR=RED] NOTE: YOUR ACCOUNT WILL BE RISKED [/COLOR] [COLOR=RED] NOTE: You need both client/cache because it works as current RuneScape does. [/COLOR] Download (Client): [url]http://uppit.com/8wcnqqlp2al8/RS07.rar[/url] Download (Cache): [url]http://uppit.com/vvkmydomxcu1/oldschool.rar[/url] Semi-Refractored login block: [CODE] static final void performLogin(byte var0) { try { if(0 == client.loginStep * 1085831163) { if(null != Class106.rsSocket) { Class106.rsSocket.method1303(851916919); Class106.rsSocket = null; } Class22.aClass87_196 = null; client.aBool2569 = false; client.anInt2519 = 0; client.loginStep = 893909811; } if(1 == client.loginStep * 1085831163) { if(Class22.aClass87_196 == null) { Class22.aClass87_196 = client.aClass91_2494.method1032(Class19.aString171, 564889515 * Class35.anInt384, 1488898789); } if(2 == Class22.aClass87_196.anInt1235) { throw new IOException(); } if(Class22.aClass87_196.anInt1235 == 1) { Class106.rsSocket = new RSSocket((Socket)Class22.aClass87_196.anObject1236, client.aClass91_2494); Class22.aClass87_196 = null; client.loginStep = 1787819622; } } if(1085831163 * client.loginStep == 2) { client.encryptedBuffer.bufferedOffset = 0; client.encryptedBuffer.writeByte(14, (byte)-24); Class106.rsSocket.flushBuffer(client.encryptedBuffer.buffer, 0, 1, 1114600051); client.rsBuffer.bufferedOffset = 0; client.loginStep = -1613237863; } int returnCode; if(client.loginStep * 1085831163 == 3) { if(null != Class6_Sub1.aClass9_1525) { Class6_Sub1.aClass9_1525.method80(29100076); } if(Class101.aClass9_1478 != null) { Class101.aClass9_1478.method80(29100076); } returnCode = Class106.rsSocket.read((byte)-62); if(null != Class6_Sub1.aClass9_1525) { Class6_Sub1.aClass9_1525.method80(29100076); } if(null != Class101.aClass9_1478) { Class101.aClass9_1478.method80(29100076); } if(0 != returnCode) { Class36.method434(returnCode, (short)30504); return; } client.rsBuffer.bufferedOffset = 0; client.loginStep = 174581759; } if(1085831163 * client.loginStep == 5) { int[] isaacSeed = new int[]{(int)(Math.random() * 9.9999999E7D), (int)(Math.random() * 9.9999999E7D), (int)(Math.random() * 9.9999999E7D), (int)(Math.random() * 9.9999999E7D)}; client.encryptedBuffer.bufferedOffset = 0; client.encryptedBuffer.writeByte(10, (byte)-29); client.encryptedBuffer.writeInt(isaacSeed[0], 1377490581); client.encryptedBuffer.writeInt(isaacSeed[1], 1647386472); client.encryptedBuffer.writeInt(isaacSeed[2], -1205005038); client.encryptedBuffer.writeInt(isaacSeed[3], -741301682); client.encryptedBuffer.writeLong(0L); client.encryptedBuffer.writeRS2String(Class10.aString66, 934332000); client.encryptedBuffer.encryptRSA(Class14.CLIENT_MODULUS, Class14.CLIENT_EXPONENT, -953498452); client.loginBuffer.bufferedOffset = 0; if(40 == client.anInt2687 * 1737230423) { client.loginBuffer.writeByte(18, (byte)-71); } else { client.loginBuffer.writeByte(16, (byte)-89); } client.loginBuffer.writeShort(0, -2029936739); int var2 = -1184659319 * client.loginBuffer.bufferedOffset; client.loginBuffer.writeInt(2, 1797983232); client.loginBuffer.writeBytes(client.encryptedBuffer.buffer, 0, -1184659319 * client.encryptedBuffer.bufferedOffset, (byte)112); int var3 = client.loginBuffer.bufferedOffset * -1184659319; client.loginBuffer.writeRS2String(Class10.aString94, 1425510257); client.loginBuffer.writeByte(client.aBool2521?1:0, (byte)-118); RSBuffer var4 = client.loginBuffer; byte[] archivedCrcs = new byte[24]; try { Class86.aClass23_1215.method260(0L); Class86.aClass23_1215.method267(archivedCrcs, -397279272); int crcKey; for(crcKey = 0; crcKey < 24 && archivedCrcs[crcKey] == 0; ++crcKey) { ; } if(crcKey >= 24) { throw new IOException(); } } catch (Exception var8) { for(int index = 0; index < 24; ++index) { archivedCrcs[index] = -1; } } var4.writeBytes(archivedCrcs, 0, 24, (byte)119); client.loginBuffer.writeInt(1537372459 * Class43.aClass58_Sub1_649.anInt800, 261801891); client.loginBuffer.writeInt(1537372459 * Class47.aClass58_Sub1_724.anInt800, -310350449); client.loginBuffer.writeInt(1537372459 * Class20.aClass58_Sub1_178.anInt800, -1332937171); client.loginBuffer.writeInt(Class2_Sub3.aClass58_Sub1_1570.anInt800 * 1537372459, 1214581867); client.loginBuffer.writeInt(Class49.aClass58_Sub1_744.anInt800 * 1537372459, -1849144269); client.loginBuffer.writeInt(Class82_Sub2.aClass58_Sub1_1615.anInt800 * 1537372459, 1006076764); client.loginBuffer.writeInt(Class37.aClass58_Sub1_620.anInt800 * 1537372459, 74907275); client.loginBuffer.writeInt(Class27.aClass58_Sub1_310.anInt800 * 1537372459, -667747023); client.loginBuffer.writeInt(Class18.aClass58_Sub1_167.anInt800 * 1537372459, 498416709); client.loginBuffer.writeInt(1537372459 * Class22.aClass58_Sub1_195.anInt800, 235198861); client.loginBuffer.writeInt(Class2_Sub4.aClass58_Sub1_1577.anInt800 * 1537372459, 348165204); client.loginBuffer.writeInt(Class59.aClass58_Sub1_807.anInt800 * 1537372459, 10172757); client.loginBuffer.writeInt(1537372459 * Class2_Sub7.aClass58_Sub1_1586.anInt800, 769347530); client.loginBuffer.writeInt(1537372459 * Class82.aClass58_Sub1_1175.anInt800, 1463730298); client.loginBuffer.writeInt(Class72.aClass58_Sub1_899.anInt800 * 1537372459, -940332640); client.loginBuffer.writeInt(Class5.aClass58_Sub1_22.anInt800 * 1537372459, 958791696); client.loginBuffer.encryptXTEA(isaacSeed, var3, -1184659319 * client.loginBuffer.bufferedOffset, 1954083324); client.loginBuffer.readShort(-1184659319 * client.loginBuffer.bufferedOffset - var2, (byte)0); Class106.rsSocket.flushBuffer(client.loginBuffer.buffer, 0, client.loginBuffer.bufferedOffset * -1184659319, 1114600051); client.encryptedBuffer.initiateCipher(isaacSeed, 288512828); for(int cipherSeed = 0; cipherSeed < 4; ++cipherSeed) { isaacSeed[cipherSeed] += 50; } client.rsBuffer.initiateCipher(isaacSeed, -392896412); client.loginStep = 1068491570; } if(1085831163 * client.loginStep == 6 && Class106.rsSocket.remainingBytes(-453589586) > 0) { returnCode = Class106.rsSocket.read((byte)-105); if(returnCode == 21 && 20 == 1737230423 * client.anInt2687) { client.loginStep = 1962401381; } else if(returnCode == 2) { client.loginStep = -544746293; } else { if(returnCode == 15 && 40 == 1737230423 * client.anInt2687) { Class1.method46(-925744550); return; } if(returnCode != 23 || client.anInt2550 * -48763711 >= 1) { Class36.method434(returnCode, (short)8200); return; } client.anInt2550 += 380543809; client.loginStep = 0; } } if(7 == client.loginStep * 1085831163 && Class106.rsSocket.remainingBytes(1096054) > 0) { client.anInt2551 = (Class106.rsSocket.read((byte)-14) + 3) * -822422236; client.loginStep = -1438656104; } if(8 == client.loginStep * 1085831163) { client.anInt2519 = 0; Class6_Sub1.method1339(Class36.aString416, Class36.aString417, client.anInt2551 * 1926529687 / 60 + Class36.aString414, (byte)-4); if((client.anInt2551 -= 57875751) * 1926529687 <= 0) { client.loginStep = 0; } } else { /* * This is the return code. * * byte, * byte, * byte, * short, * byte, * byte. */ if(9 == 1085831163 * client.loginStep && Class106.rsSocket.remainingBytes(-21480982) >= 8) { client.anInt2778 = Class106.rsSocket.read((byte)86) * -312268449; client.aBool2578 = Class106.rsSocket.read((byte)32) == 1; client.anInt2655 = Class106.rsSocket.read((byte)-3) * 1129286939; client.anInt2655 = 1129286939 * (1114965267 * client.anInt2655 << 8); client.anInt2655 += Class106.rsSocket.read((byte)63) * 1129286939; client.anInt2599 = Class106.rsSocket.read((byte)-49) * 1927050065; Class106.rsSocket.method1285(client.rsBuffer.buffer, 0, 1, (byte)-38); client.rsBuffer.bufferedOffset = 0; client.anInt2748 = client.rsBuffer.method2310(-1709952174) * 1478418667; Class106.rsSocket.method1285(client.rsBuffer.buffer, 0, 2, (byte)-117); client.rsBuffer.bufferedOffset = 0; client.anInt2534 = client.rsBuffer.method1536((byte)106) * -333364951; client.loginStep = 349163518; } if(10 == 1085831163 * client.loginStep) { if(Class106.rsSocket.remainingBytes(-659661288) >= client.anInt2534 * -1468994791) { client.rsBuffer.bufferedOffset = 0; Class106.rsSocket.method1285(client.rsBuffer.buffer, 0, client.anInt2534 * -1468994791, (byte)-10); Class10.method161(-1140459831); Class18.anInt168 = -175501583; Class99.sendLandscape(false, 1008005263); client.anInt2748 = -1478418667; } } else { client.anInt2519 += -1058645829; if(-630051725 * client.anInt2519 > 2000) { if(-48763711 * client.anInt2550 < 1) { if(Class35.anInt384 * 564889515 == Class39.anInt628 * 1918955957) { Class35.anInt384 = -720944603 * Class16.anInt153; } else { Class35.anInt384 = Class39.anInt628 * 524192799; } client.anInt2550 += 380543809; client.loginStep = 0; } else { Class36.method434(-3, (short)21231); } } } } } catch (IOException var9) { if(client.anInt2550 * -48763711 < 1) { if(564889515 * Class35.anInt384 == Class39.anInt628 * 1918955957) { Class35.anInt384 = -720944603 * Class16.anInt153; } else { Class35.anInt384 = 524192799 * Class39.anInt628; } client.anInt2550 += 380543809; client.loginStep = 0; } else { Class36.method434(-2, (short)25371); } } } [/CODE] RSA Exponent/Modulus: [CODE] static BigInteger CLIENT_EXPONENT = new BigInteger("a874ab1a0e8737f3a0113e1b71ef364c3dec73f8ed98dd133d249b66735198ff05a6a7cf3b917a38c8b163f7349b76cde7133f81fcf045f691eca39135662f57", 16); static BigInteger CLIENT_MODULUS = new BigInteger("10001", 16); [/CODE] XTEA Encryption: [CODE] public void encryptXTEA(int[] cryption, int offset, int length, int dummy) { int position = -1184659319 * this.bufferedOffset; this.bufferedOffset = offset * 443575737; int numBlocks = (length - offset) / 8; for(int var7 = 0; var7 < numBlocks; ++var7) { int firstBlock = this.readInt(-1905375349); int secondBlock = this.readInt(-1905375349); int sum = 0; int delta = -1640531527; for(int index = 32; index-- > 0; secondBlock += firstBlock + (firstBlock << 4 ^ firstBlock >>> 5) ^ sum + cryption[sum >>> 11 & 3]) { firstBlock += (secondBlock << 4 ^ secondBlock >>> 5) + secondBlock ^ cryption[sum & 3] + sum; sum += delta; } this.bufferedOffset -= -746361400; this.writeInt(firstBlock, 316796827); this.writeInt(secondBlock, -952500774); } this.bufferedOffset = 443575737 * position; } [/CODE]
×