Hello all
i m trying to use the fake players bug in CoD 1 with PHP but i m not able to get the right connect query. I ve tried this for hours now but it wont work.
At the moment i m trying it this way:
1.Authorize Key with this Query:
Code:
\xff\xff\xff\xffgetKeyAuthorize 0 $key
2. Get challenge with this:
Code:
\xff\xff\xff\xffgetchallenge
On the response which looks like "????????????challengeResponse 1711315683" i use a regex which replaces all non-numeric chars so i get "1711315683".
3. Now the connect part where i dont really know if i m doing it right. The Query String looks like this:
Code:
'\xff\xff\xff\xffconnect'.$huffman
Where $huffman is the huffman-encoded Version of this string:
Code:
\challenge\\'.$chal.'\qport\0\protocol\5\cl_guid\<myguid>\cl_punkbuster\1\snaps\20\rate\25000\name\test1\model\none\password\\g_password\\
The guid fits the Key i m using to Authorize and the protocol fits the protocol which is returned by "getstatus".
What i m wondering about is the huffman encoded string, it has a big amount of numbers at the beginning:
Code:
l4n4p4r4e4c5g5t4m5b6h7q7\305d5a5_6w6o4u556i6s41626<7y7>7k7?????????~???}`?????????
???!6+m/[???|w??????z?????????C??????s!???'
????????????fI????? ??????9????????A???HV??????w??????????????
I got the huffman class from the Internet but it should work fine :/
I dont really know what i could try to get this to work?
Would be so great if anybody could help me here, i really would like to use this with PHP.
Thanks in Advance :)
BC