I am looking for a method that allows me to read Yu-Gi-Oh! Cross Duel's traffic in plaintext format.
I'll link 1 example of encrypted traffic at the bottom of this post, for reference. Ideally, you would produce a way, show me an example of some plaintext traffic you get, then I would ask you to go through a couple of scenarios to confirm your method is working, and then I'd pay and you'd give me the method.
I prefer Paypal for payment, but if you can't use it, I'll see what we can do.
If you need further information/resources to help you produce the script, PM me here and I'll see what I can provide. I can also produce more examples of encrypted traffic for you to work with, if it helps.
--------------------------
Some background info:
Konami has another app that's relevant here: Yu-Gi-Oh! Duel Links. It's been around for awhile, and it used to have unencrypted traffic. After a certain update, Duel Links started using encrypted traffic (using lz4 compression, and I think a character offset?). I previously hired someone on Zenhax to produce a usable Python script to decrypt this traffic into comprehendable text. This worked for a few years, but then another update was released that rendered the traffic unreadable for me - Duel Links probably uses different encryption as a result of that update.
I believe Cross Duel uses the same new encryption that the first app currently uses. The reason I think this? I've been using Charles Proxy to read the apps' traffic; currently, Charles can only decipher bits of text from the apps' traffic, and both of them share certain unique, key text in common, which Duel Links never had in its traffic until the most recent update.
Why is this background info relevant? It's just a possibility that maybe lz4 compression is involved here, and/or a character offset. I'm unsure.
------------------------------------------------------------------------------------------------------------------
Encrypted traffic example:
Pastebin link* This data was output by Charles Proxy. If you scroll down to line 772 in Pastebin (or line 00003030 in the data), you'll see I have the hex data by itself, in a 2nd section. The only reason I kept the first section, is because Charles Proxy partially deciphers some of the encryption, which you can see in the right column.
If decrypted successfully, there will probably be a section that has a list of various numbers, whose values can range from 4000 to more than 10000 (but never reaching 20000). The list will probably consist of 20 numbers (possibly with very small subsections / accompanying data). And I think there might be at least 4 of these lists in this particular example.
It is also possible that those numbers will actually be names instead, in which case, there would be lists with 20 names.
_________________
If I'm absent and don't respond to a message here, I can be found on
Yugipedia, where you can leave a message to refer me back to here.