Difference between revisions of "Packet Length Extractor"

From OpenKore Wiki
Jump to navigation Jump to search
(7 intermediate revisions by 2 users not shown)
Line 10: Line 10:
 
== RO Tools ==
 
== RO Tools ==
  
* [http://www.megaupload.com/?d=7PXQ9J1N JCV's RO Tools v1.0.3] (Link down as of Jan 19, 2012.  See instructions below for OpenPacketExtractor)
+
* <s>[http://dfiles.ru/files/xf47ncmr8 JCV's RO Tools v1.0.3] (See instructions below for OpenPacketExtractor)</s>
 +
* Also in [http://sourceforge.net/p/openkore/code/HEAD/tree/packet-extracter/tags/RO%20Tools%201.0.3/ OpenKore SVN].
  
 
It's better to use JCV's RO Tools as it is more up to date and have some fixes for newer clients. Also it's much easier to maintain, but it has undesirable and outdated options in addition to the Openkore packet extractor.
 
It's better to use JCV's RO Tools as it is more up to date and have some fixes for newer clients. Also it's much easier to maintain, but it has undesirable and outdated options in addition to the Openkore packet extractor.
Line 16: Line 17:
 
=== Usage ===
 
=== Usage ===
 
# Open RO Tools.
 
# Open RO Tools.
# Click in the button with '''...''' beside the box. Search for your's server executable (not server patcher) and open it. <br/>[[File:button.PNG]]
+
# Click in the button with '''...''' beside the box. Search for your's server executable ('''not server patcher and not launcher !!!''') and open it. <br/>[[File:button.PNG]]
 
# On Extractor Type, check '''Full Disarm''' box. <br/>[[File:full.PNG]]
 
# On Extractor Type, check '''Full Disarm''' box. <br/>[[File:full.PNG]]
 
# Click on '''Start''' button and wait it to finish. <br/>[[File:start.PNG]]
 
# Click on '''Start''' button and wait it to finish. <br/>[[File:start.PNG]]
Line 22: Line 23:
  
 
== Packet Extractor ==
 
== Packet Extractor ==
 +
* [https://github.com/OpenKore/packet-extractor/tree/aaf23c67eeb7824c647d2d40f8c88d734304cbf8 OpenKore Packet Length Extractor v1.1.0]
 +
* Mirror: [http://sourceforge.net/p/openkore/code/HEAD/tree/packet-extracter/tags/packet-extracter%201.1.0/ OpenKore SVN].
  
* [http://www.megaupload.com/?d=MLUVJLSL OpenKore Packet Length Extractor v1.1.0] (Link down as of Jan 19,2012)
+
=== Usage ===
* Also in OpenKore SVN.
+
# Run <code>openkore-packet-length-extractor.exe</code>
 +
# Click in the button with '''...''' beside the box. Search for your's server executable (not server patcher) and open it.
 +
# Click on '''Extract''' button and wait it to finish.
  
 
== Packet Extractor v3 ==
 
== Packet Extractor v3 ==
  
* In OpenKore SVN. (See [http://forums.openkore.com/viewtopic.php?f=36&t=13305 kLab's forum post on Open Packet Extractor for more details.])
+
* [https://github.com/OpenKore/packet-extractor Packet Extractor v3]
 +
* Mirror: [http://sourceforge.net/p/openkore/code/HEAD/tree/packet-extracter/trunk/ OpenKore SVN]. (See [http://forums.openkore.com/viewtopic.php?f=36&t=13305 kLab's forum post on Open Packet Extractor for more details.])
  
 
Packet extractor branch to work with new insert server list here clients.
 
Packet extractor branch to work with new insert server list here clients.
  
 
=== Usage ===
 
=== Usage ===
# Run <code>packet_extract.pl</code> with your ragexe file name as an argument. It will generate <code>extractor.exe</code>.
+
Variant 1 (for noobs):
# Run <code>extractor.exe</code> (works with wine on non-Windows) which will output recvpackets contents to STDOUT.
+
# Download <code>start.exe</code> from http://misc.openkore.com and unpack to the same folder where <code>packet_extract.pl</code> is placed.
 +
# Copy target .exe file to the same folder where <code>packet_extract.pl</code> is placed.
 +
# Run <code>packet_extract.bat</code> to save extracted packets to text file.
 +
 
 +
Variant 2 (for profi):
 +
# Download <code>start.exe</code> from http://misc.openkore.com and unpack to the same folder where packet_extract.pl is placed (optional).
 +
# Copy target .exe file to the same folder where <code>packet_extract.pl</code> is placed.
 +
# Run <code>start.exe ! packet_extract.pl your_exe_name.exe</code> or <code>perl packet_extract.pl your_exe_name.exe</code> to generate "extractor.exe".
 +
# Run <code>extractor.exe > recvpackets.txt</code> to save extracted packets to text file.
  
 
== Notes ==
 
== Notes ==
* Recvpackets file can be renamed as long as recvpackets option on [[servers.txt]] is set accordingly. (See [[Connectivity Guide]])
+
* Recvpackets file can be renamed as long as recvpackets option on servers.txt is set accordingly. (See [[Connectivity Guide]])
 
* There may be problems extracting the recvpackets if your server's client has some kind of protection. '''You''' should deal with it (like unpack if binary is packed) before using packet extractor, if it fails to find anything.
 
* There may be problems extracting the recvpackets if your server's client has some kind of protection. '''You''' should deal with it (like unpack if binary is packed) before using packet extractor, if it fails to find anything.

Revision as of 03:01, 17 December 2016

If you're having server problems, such as:

  • Packet Tokenizer: Unknown switch: xxxx
  • Getting disconnected after a few seconds
  • NPCs, players and monsters are not recognized by Kore (shown as Unknown)

Then generating a new recvpackets.txt might solve the problem. It's advisable to always extract the recvpackets before running Openkore. The file must be on tables folder.

The network data that the server sends to Kore, is a byte stream. Kore must be able to recognize messages inside that byte stream to be able to do something with it. But the size of the messages can vary from to server to server. Recvpackets.txt contains information about the size of each message, so Kore can correctly split the byte stream into messages.

RO Tools

It's better to use JCV's RO Tools as it is more up to date and have some fixes for newer clients. Also it's much easier to maintain, but it has undesirable and outdated options in addition to the Openkore packet extractor.

Usage

  1. Open RO Tools.
  2. Click in the button with ... beside the box. Search for your's server executable (not server patcher and not launcher !!!) and open it.
    File:button.PNG
  3. On Extractor Type, check Full Disarm box.
    File:full.PNG
  4. Click on Start button and wait it to finish.
    File:start.PNG
  5. After it finishes, it will ask for you to save the file. Save it on tables folder, inside your Openkore's root folder. Override current file if needed.

Packet Extractor

Usage

  1. Run openkore-packet-length-extractor.exe
  2. Click in the button with ... beside the box. Search for your's server executable (not server patcher) and open it.
  3. Click on Extract button and wait it to finish.

Packet Extractor v3

Packet extractor branch to work with new insert server list here clients.

Usage

Variant 1 (for noobs):

  1. Download start.exe from http://misc.openkore.com and unpack to the same folder where packet_extract.pl is placed.
  2. Copy target .exe file to the same folder where packet_extract.pl is placed.
  3. Run packet_extract.bat to save extracted packets to text file.

Variant 2 (for profi):

  1. Download start.exe from http://misc.openkore.com and unpack to the same folder where packet_extract.pl is placed (optional).
  2. Copy target .exe file to the same folder where packet_extract.pl is placed.
  3. Run start.exe ! packet_extract.pl your_exe_name.exe or perl packet_extract.pl your_exe_name.exe to generate "extractor.exe".
  4. Run extractor.exe > recvpackets.txt to save extracted packets to text file.

Notes

  • Recvpackets file can be renamed as long as recvpackets option on servers.txt is set accordingly. (See Connectivity Guide)
  • There may be problems extracting the recvpackets if your server's client has some kind of protection. You should deal with it (like unpack if binary is packed) before using packet extractor, if it fails to find anything.