Prolix Bnetd Packet Reference
- by moonshine
________________________________________________________________________________
Packet 0x01
_____________________________________________________________________
Type: Client to server.
Dump:
01 - .
Description: Indicates a binary client login sequence.
________________________________________________________________________________
Packet 0x02
_____________________________________________________________________
Type: Client to server.
Dump:
02 - .
Description: Indicates a file transfer login sequence.
________________________________________________________________________________
Packet 0x1eff
___________________________________________________________________
Type: Client to server.
Dump:
FF 1E ?? 00 01 00 00 00 - 01 00 00 00 ?? ?? ?? ?? ................
44 78 91 00 0D 51 DA 13 - 00 00 Dx...Q....
Description: Client Computer info 2. This sends client token and client id, along with some unknowns.
The ?? ?? ?? ?? Is generally the server ip.
________________________________________________________________________________
Packet 0x12ff
___________________________________________________________________
Type: Client to server.
Dump:
FF 12 ?? 00 20 27 ED A2 - AD 08 C1 01 20 4F 8E F6 ..5. '...... O..
72 08 C1 01 E0 01 00 00 - 09 10 00 00 09 10 00 00 r...............
09 10 00 00 65 6E 63 00 - 32 00 43 41 4E 00 43 61 ....enc.2.CAN.Ca
6E 61 64 61 00
nada.
Description: Gives bnetd your Country, Language and timezone information.
________________________________________________________________________________
Packet 0x06ff
___________________________________________________________________
Type: Client to server.
Dump:
FF 06 ?? 00 36 38 58 49 - 4E 42 32 57 4F 00 00 00 ....68XINB2WO...
00 00 00 00
....
Description: Sends bnetd your processor type, client type and version id.
________________________________________________________________________________
Packet 0x05ff
___________________________________________________________________
Type: Server to client.
Dump:
FF 05 ?? 00 01 00 00 00 - ?? ?? ?? ?? 44 78 91 00 .........O..Dx..
0D 51 DA 13 - .Q..
Description: Server computer info reply. This packet sends back client token and the client id. The ?? ?? ?? ?? is generally the server ip.
________________________________________________________________________________
Packet 0x1dff
___________________________________________________________________
Type: Server to client.
Dump:
FF 1D 0C 00 0C 67 08 00 7A 3C D8 75 .....g..z<.u
Description: This is the session number & key bnetd gives you, it is used in the user password hash packet
later on in the authentication process.
________________________________________________________________________________
Packet 0x1dff
___________________________________________________________________
Type: Server to client.
Dump:
FF 06 ?? 00 00 C1 12 EC 09 28 BC 01 49 58 38 36 ..Y......(..IX86
76 65 72 35 2E 6D 70 71 00 41 3D 31 38 37 35 35 ver5.mpq.A=18755
39 31 33 34 31 20 42 3D 32 34 39 31 30 39 39 38 91341 B=24910998
30 39 20 43 3D 36 33 34 38 35 36 36 30 34 20 34 09 C=634856604 4
20 41 3D 41 2D 53 20 42 3D 42 5E 43 20 43 3D 43 A=A-S B=B^C C=C
2B 41 20 41 3D 41 5E 42 00 +A A=A^B.
Description: This packet authenticates the client by sending a formula. You must solve it and hash it, then send the answer back.
________________________________________________________________________________
Packet 0x25ff
___________________________________________________________________
Type: Server to client or Client to server.
Dump:
FF 25 ?? 00 BC 5E EC 05 - .%...^..
Description: The 'ping' packet lets bnetd determine your latency. The first integer is the standard header, while the second is a time stamp (which determines your latency).
________________________________________________________________________________
Packet 0x07ff
___________________________________________________________________
Type: Client to server.
Dump:
FF 07 ?? 00 36 38 58 49 - 4E 42 32 57 4F 00 00 00 ..E.68XINB2WO...
00 02 00 02 A8 92 31 10 - 57 61 72 63 72 61 66 74 ......1.Warcraft
20 49 49 20 42 4E 45 2E - 65 78 65 20 30 35 2F 31 II BNE.exe 05/1
35 2F 30 31 20 32 30 3A - 35 33 3A 31 38 20 37 31 5/01 20:53:18 71
32 37 30 34 00 - 2704.
Description: This is the packet you send back in response to packet 0x1dff (seen above). It includes processor type, client type, client version, client program executable name, GMT date & time, and finally the executable file's size in bytes.
________________________________________________________________________________
Packet 0x07ff
___________________________________________________________________
Type: Server to client.
Dump:
FF 07 ?? 00 02 00 00 00 - 00 00 ..........
Description: This is the server's response to the client's 0x07ff packet (seen above). The first integer is the standard header, while the second is the success or fail of the clients previous packet.
0x00 - Bad Version
0x01 - Update
0x02 - Success.
________________________________________________________________________________
Packet 0x2dff
___________________________________________________________________
Type: Client to server.
Dump:
FF 2D ?? 00 - .-..
Description: Sends bnetd server an icon request.
________________________________________________________________________________
Packet 0x2dff
___________________________________________________________________
Type: Server to client.
Dump:
FF 2D ?? 00 80 10 FD 1D - 38 C4 BF 01 69 63 6F 6E .-......8...icon
73 2E 62 6E 69 00 - s.bni.
Description: Replies back to the client's 0x2dff packet (seen above).
________________________________________________________________________________
Packet 0x36ff
___________________________________________________________________
Type: Client to server.
Dump:
FF 36 ?? 00 00 00 00 00 0D 00 00 00 01 00 00 00 .64.............
7F D7 00 00 90 64 77 2F D7 5B 42 38 1F A1 A2 6F .....dw/.[B8...o
E8 FA BE F8 B6 0B BA 0F CA 64 3A 17 14 56 83 AB .........d:..V..
42 6F 62 00 Bob.
Description: Sends bnetd your cd-key information. This includes your cdkey hash and the name your cd-key is
registered to.
________________________________________________________________________________
Packet 0x36ff
___________________________________________________________________
Type: Server to client.
Dump:
FF 36 ?? 00 01 00 00 00 42 6F 62 00 .6......Bob.
Description: This is the reply from bnetd from the client's packet 0x36ff (seen above). This repeats the user's registeration name, and also returns success or failure flags.
0x01 - OK
0x02 - Failed
0x03 - Wrong application,
0x04 - Unknown error
0x05 - CDKEY Currently in use.
________________________________________________________________________________
Packet 0x33ff
___________________________________________________________________
Type: Client to server.
Dump:
FF 33 ?? 00 1A 00 00 00 - 00 00 00 00 74 6F 73 5F .3..........tos_
55 53 41 2E 74 78 74 00 - USA.txt.
FF 33 ?? 00 1B 00 00 00 - 00 00 00 00 62 6E 73 65 .3..........bnse
72 76 65 72 2E 69 6E 69 - 00 rver.ini.
Description: This packet appears to have two parts. The first is a Terms Of Service text request, while the second
requests the server ini.
________________________________________________________________________________
Packet 0x33ff
___________________________________________________________________
Type: Server to client.
Dump:
FF 33 ?? 00 1A 00 00 00 - 00 00 00 00 C2 9F E5 DB .3 .............
DA D8 C0 01 74 6F 73 5F - 55 53 41 2E 74 78 74 00 ....tos_USA.txt.
FF 33 ?? 00 1B 00 00 00 - 00 00 00 00 DA D4 D7 D0 .3!.............
58 89 BF 01 62 6E 73 65 - 72 76 65 72 2E 69 6E 69 X...bnserver.ini
00 - .
Description: This packet has two parts also. It replies to the client's 0x33ff packet(s) (seen above).
________________________________________________________________________________
Packet 0x29ff
___________________________________________________________________
Type: Client to server.
Dump:
FF 29 ?? 00 CF 17 28 00 A3 D3 2C 5C F4 18 02 40 .)%...(...,...@
F9 B8 EA F4 A5 B1 3F 39 85 89 2D DB 18 2D B9 D4 ......?9..-..-..
52 6F 73 73 00 Ross.
Description: Sends bnetd your password hash, session key, and player username.
________________________________________________________________________________
Packet 0x29ff
___________________________________________________________________
Type: Server to client.
Dump:
FF 29 ?? 00 01 00 00 00 - .)......
Description: Replies to the client's 0x29ff packet (seen above). Returns success & fail messages:
0x00 - Login Failed
0x01 - Login successful.
________________________________________________________________________________
Packet 0x31ff___________________________________________________________________
Type: Client to server.
Dump:
FF 31 ?? 00 22 1A 9A 00 64 B7 C5 21 2C 82 57 F4 .1;."...d..!,.W.
0A 36 73 25 1E A5 42 5F FA 36 54 97 BC 65 3F E1 .6s%..B_.6T..e?.
7D 5A 54 17 4C 33 B9 1A 09 25 49 45 99 52 69 45 ZT.L3...%IE.RiE
B1 E6 5C 9C 77 72 73 70 6F 69 00 ...wrspoi.
Description: Sends bnetd a request to change your account password. The packet includes Your old password hash,
your new password hash, and your username.
________________________________________________________________________________
Packet 0x31ff___________________________________________________________________
Type: Server to client.
Dump:
FF 31 ?? 00 00 00 00 00 .1......
Description: This is bnetd's reply to the client's 0x31ff packet (seen above). It includes success & fail messages:
0x00000000 - Password change failure
0x00000001 - Password change success.
________________________________________________________________________________
Packet 0x0fff___________________________________________________________________
Type: Server to client.
Dump:
FF 0F ?? 00 07 00 00 00 - 01 00 00 00 57 01 00 00 ..0.........W...
00 00 00 00 0D F0 AD BA - 0D F0 AD BA 68 69 6E 64 ............hind
65 00 57 61 72 32 42 4E - 45 20 43 41 4E 2D 31 00 e.War2BNE CAN-1.
Description: Note that the above hex-dump of the packet is only an example, there is many variations of this packet.
The packet includes the packet id messages:
0x00000001
- Show user
0x00000002
- User joined
0x00000003
- User leave
0x00000004
- User whisper
0x00000005
- User talks
0x00000006
- Broadcast Message
0x00000007
- Joined channel
0x00000009
- User flags changed
0x0000000a
- Sent whisper
0x0000000d
- Channel full
0x0000000e
- Channel does not exist
0x0000000f
- Channel restricted
0x00000012
- Info
0x00000013
- Unknown Error
0x00000017
- User Emotion
The packet also includes the flag messages:
0x00000001
- Blizzard icon (Blizzard employee)
0x00000002
- Gavel icon (Channel operator)
0x00000004
- Megaphone icon (Speaker in moderated channel)
0x00000008
- Blue Blizzard, green b.net, or red BNETD logo (Administrator)
0x00000010
- Plug icon (Chat client or game client without UDP support)
0x00000020
- Red 'X' icon (Squelched user)
0x00000040
- Sun glasses icon (special guest)
0x00000200
- PGL Player logo (registered PGL player)
0x00000400
- Official PGL Logo (registered PGL official)
________________________________________________________________________________
Packet 0x0eff___________________________________________________________________
Type: Client to server.
Dump:
FF 0E ?? 00 6E 6F 6E 00 - ....non.
Description: Client message, this packet is used to send most normal messages to bnetd
(like /commands and talking).
________________________________________________________________________________
Packet 0x15ff___________________________________________________________________
Type: Client to server.
Dump:
FF 15 ?? 00 36 38 58 49 52 41 54 53 00 00 00 00 ....68XIRATS....
AF 14 55 36 ..U6
Description: This packet is an 'add request' (in real game clients that is the ad at the top center). Clients
generally send this about every 15 seconds or so.
________________________________________________________________________________
Packet 0x15ff___________________________________________________________________
Type: Server to client.
Dump:
FF 15 ?? 00 C3 00 00 00 2E 73 6D 6B 00 9B 36 A6 ..<......smk..6.
8F 5B BE 01 61 64 30 30 30 30 63 33 2E 73 6D 6B .[..ad0000c3.smk
00 68 74 74 70 3A 2F 2F 77 77 77 2E 66 61 74 68 .http://www.fath
65 72 68 6F 6F 64 2E 6F 72 67 2F 00 erhood.org/.
Description: This is the ad reply to the client's add request packet, 0x15ff (seen above). It includes ad ID,
extention tag, a timestamp, and the URL for the add itself.
________________________________________________________________________________
Packet 0x21ff___________________________________________________________________
Type: Client to server.
Dump:
FF 21 ?? 00 36 38 58 49 4C 54 52 44 C3 00 00 00 .!8.68XILTRD....
61 64 30 30 30 30 63 33 2E 73 6D 6B 00 68 74 74 ad0000c3.smk.htt
70 3A 2F 2F 77 77 77 2E 66 61 74 68 65 72 68 6F p://www.fatherho
6F 64 2E 6F 72 67 2F 00 od.org/.
Description: This is sent after the client gets an Ad reply from the server.
________________________________________________________________________________
Packet 0x3aff___________________________________________________________________
Type: Client to server.
Dump:
FF 3A ?? 00 58 4C F2 00 19 C2 08 00 D7 33 37 D3 .:..XL.......37.
42 8C 92 37 C2 26 08 A9 3E 92 05 28 A1 5A 18 B9 B..7.&..>..(.Z..
6D 61 73 74 6F 64 6F 6E 74 66 69 6C 6D 00 mastodontfilm.
Description: This packet sends bnetd a request to login.
________________________________________________________________________________
Packet 0x3aff___________________________________________________________________
Type: Server to client.
Dump:
FF 3a ?? 00 00 00 00 00 .:......
Description: Bnetd's response to the login request packet. The packet returns these success & fail messages:
0x00000000
- Success
0x00000001
- Account already exists
0x00000002
- Password failure
________________________________________________________________________________
Packet 0x2aff___________________________________________________________________
Type: Client to server.
Dump:
FF 2A ?? 00 91 4F 93 DF 57 74 B5 C8 48 0F 4D 9B .* ..O..Wt..H.M.
A2 28 A6 03 C1 D9 DA 11 42 69 6D 42 6F 3A 29 00 .(......BimBo:).
Description: This packet sends bnetd a 'create account' request.
________________________________________________________________________________
Packet 0x2aff___________________________________________________________________
Type: Server to client.
Dump:
FF 2A ?? 00 01 00 00 00
.*......
13 00 00 00 78 52 82 02 00 00 00 00 00 00 00 00 ................
Description: This packet is in reply to the client's 0x2aff packet (seen above). It gives the client the following possible outcomes of the account creation:
0x00000001
- Account created successfully
0x00000000
- Account creation failed.
0x00000013
- Unknown
0x02825278
- Unknown
0x00000000
- Unknown
0x00000000
- Unknown
________________________________________________________________________________