Knowing the past of DICE, their encryption methods are pretty weak. This guy (http://aluigi.altervista.org/papers.htm) has done a lot of research and reverse engineering with products that incorporate gamespy into them, and by reading his tutorials you can see the encryption methods for various things are poor. You might be able to email him and see if he can dig into bf2142 and see how stat information is encrypted, but more than likely its nothing too complicated. For example, the cdkey checking in BF2 uses UDP packets that are XORd with the phrase 'gamespy'. Of course the cd key is MD5d before hand with other stuff (as shown in his tutorial), but it wouldnt be hard to decode the XORd text. XORing is a weak form of encryption.Slapnuts wrote:
Thats good thanks. I figured out as much from looking at an etherreal dump of a reuqest by a stats program, and i've written what you have in Java.
The thing is i'm trying to get my BF2142 stats really. So I did a dump of a BF2142 connection, and there is an auth=[insert shit here] in the query string. That suggests to me some kind of encryption preventing just any old connection obtaining my results.
does this mean that it isnt possible to obtain my results without using the encryption key that EA must use to request stats?
Any ideas?
Cheers
[XS]Shrapnel
But all in all, it shouldnt be hard to retrieve 2142 stats if you do some digging. You might also see if the guys over at bf2player.com would be kind enough to tell you how they do it. Good luck, let us know how you come along