coverxit / EasyDrcom

3rd Party Dr.COM Client for HITwh

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

U64.R0通讯模块,希望帮着看看,源程序需要修改那些地方

honeway opened this issue · comments

commented

产品版本:5.2.0.201209101.A.W.100200
主模块:5.2.0.201209100.A.W.100200
通讯模块:0.8(U64.R0)Build(k10.20120903)
升级模块:5.2.0.201209100.A.W.100200
检测模块:5.2.0.201209100.A.W.100200
网际协议:IPV4
认证/封装方式:Dr.COM / 不封装防代理
内网认证:已禁用

捕获完整的登陆与注销过程 在Google+上私信分享给你了。
https://plus.google.com/u/0/114725111277649754011

@ifhw 用办公区模式 认证网关改成192.168.211.3应该就可以

commented

@coverxit 是这样用的。之前可以。现在一打开就是无限发送Keep alive 1。然后终止

commented

@coverxit 目前我的路由器里运行的就是那个,Python的,完美运行。因为在学C++,所以想研究下你的这个。

尝试修改drcom_dealder_u62.hpp,主要是把

pkt_data.insert(pkt_data.end(), { 0x1F, 0x00 }); // Fixed Unknown

改成

pkt_data.insert(pkt_data.end(), { 0xDC, 0x02 }); // Fixed Unknown

一共有两处,一个在drcom_dealer_u62::send_alive_pkt1(),另一个在drcom_dealer_u62::send_alive_pkt2().

commented

@coverxit 好的,我试试

先发{ 0x0F, 0x27 }收到Misc, File后再改发{ 0xDC, 0x02 }
后面那一段是跟流量有关的

On Dec 4, 2015, at 19:58, HenryFong notifications@github.com wrote:

@coverxit https://github.com/coverxit
Send Alive Packet 1.如下
00000000: 07 00 28 00 0b 01 1f 00 00 00 00 00 00 00 00 00 ..(.............
00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000020: 00 00 00 00 00 00 00 00 ........

我实际客户端登录抓取的对应的是
0000 07 46 28 00 0b 01 dc 02 e1 a5 9b 03 00 00 00 00 .F(.............
0010 f4 49 96 10 00 00 00 00 00 00 00 00 00 00 00 00 .I..............
0020 00 00 00 00 00 00 00 00 ........

dc02之后以及第二行还有一段


Reply to this email directly or view it on GitHub #9 (comment).

commented

我抓的官方数据包里没有看到有发送0F 27的啊,就按之前的改发,改那两处编译之后,我发现发送的数据还是01 1f

2015-12-05 13:44 GMT+08:00 Shindo notifications@github.com:

先发{ 0x0F, 0x27 }收到Misc, File后再改发{ 0xDC, 0x02 }

On Dec 4, 2015, at 19:58, HenryFong notifications@github.com wrote:

@coverxit https://github.com/coverxit
Send Alive Packet 1.如下
00000000: 07 00 28 00 0b 01 1f 00 00 00 00 00 00 00 00 00
..(.............
00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
................
00000020: 00 00 00 00 00 00 00 00 ........

我实际客户端登录抓取的对应的是
0000 07 46 28 00 0b 01 dc 02 e1 a5 9b 03 00 00 00 00 .F(.............
0010 f4 49 96 10 00 00 00 00 00 00 00 00 00 00 00 00 .I..............
0020 00 00 00 00 00 00 00 00 ........

dc02之后以及第二行还有一段


Reply to this email directly or view it on GitHub <
https://github.com/coverxit/EasyDrcom/issues/9#issuecomment-161950486>.


Reply to this email directly or view it on GitHub
#9 (comment).

啊 之前说错了 是改 drcom_dealer_u31.hpp 抱歉

commented

好的,不要紧。你能耐心的回答我就很感谢了

Shindo notifications@github.com于2015年12月8日周二 下午2:16写道:

啊 之前说错了 是改 drcom_dealer_u31.hpp 抱歉


Reply to this email directly or view it on GitHub
#9 (comment).

求下大大的qq

我的是3.73x 802.1x 加u64 心跳是40

求大大指教一番