ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!
Home
Upgrade
Credits
Help
Search
Awards
Achievements
 1569

Tethered reversed packet structures for emulation

by GHOSTED - 05-09-2020 - 04:05 PM
#21
nice post keep it up
Reply
#22
(05-09-2020 - 04:05 PM)XeExecute Wrote:
another gift. enjoy. ^^  Alien
Code:
struct _Tethered_AuthRequest
{
    BYTE cpuKey[0x10]; // 0x00 - 0x10 [0x10]
    BYTE keyVault[0x4000]; // 0x10 - 0x4010 [0x4000]
    BYTE sanityKey[0x10]; // 0x4010 - 0x4020 [0x10]
} Tethered_AuthRequest, *pTethered_AuthRequest

struct _Tethered_PresenceRequest
{
    BYTE cpuKey[0x10]; // 0x00 - 0x10 [0x10]
    DWORD unk; // 0x10 - 0x14 [0x04]
    BYTE moduleHash[0x10]; // 0x14 - 0x24 [0x10]
    DWORD titleId; // 0x24 - 0x28 [0x04]
    CHAR gamerTag[0x10]; // 0x28 - 0x38 [0x10]
} Tethered_PresenceRequest, * pTethered_PresenceRequest

struct _Tethered_XeKeysExecuteRequest
{
    BYTE cpuKey[0x10]; // 0x00 - 0x10 [0x10]
    BOOL crl; // 0x10 - 0x14 [0x04]
    BOOL fcrt; // 0x14 - 0x18 [0x04]
    BYTE hvSalt[0x10]; // 0x18 - 0x28 [0x10]
} Tethered_XeKeysExecuteRequest, * pTethered_XeKeysExecuteRequest

struct _Tethered_XamLoaderExecuteRequest
{
    BYTE cpuKey[0x10]; // 0x00 - 0x10 [0x10]
    BOOL crl; // 0x10 - 0x14 [0x04]
    BOOL fcrt; // 0x14 - 0x18 [0x04]
    DWORD titleId; // 0x18 - 0x1C [0x04]
    BYTE kvDigest[0x10]; // 0x1C - 0x2C [0x10]
    DWORD unk; // 0x2C - 0x30 [0x04]
    DWORD unk2; // 0x30 - 0x34 [0x04]
} Tethered_XamLoaderExecuteRequest, * pTethered_XamLoaderExecuteRequest
Dont see much point of keeping this up, they patched their beef
Reply
#23
this beef is like in the old days lmao
Reply

Users browsing: 2 Guest(s)