Open the client.
Select a Character
Open Task Manager and get the process ID of your Ragnarok Client
Run > CMD > Netstat -o
it will display all network connections from your PC
look for the line with the Process Id that corresponds to the RO Client
Ping the foreign Address to get its IP [ Do NOT Include the number and ":" ]
and you have an IP for your Botting Needs
- Download Grf Tool
- Extract the folder and double click grftool file
- Click button Open and find data.grf or fdata.grf inside your ero folder and click open (c:\Program Files\<Ragnarok Folder Name>).
- In the search field you type clientinfo and click button search.
- The file you need will appear (clientinfo.xml) and double click that file.
- Save it on your desktop and open it with wordpad/notepad.
- When you open it u will discover your server ip address, port and version and apply to tables/servers.txt on your bot program. You can get GM id as well and use it to prevent from getting ban.
Download GRF Tool
1. Start up Ragnarok client like usual.
2. Open up command prompt.
3. type netstat and press enter
4. You should be able to see all local ports being connected to remote ip addresses and their respective port numbers. Normal Ragnarok port is 5000.
Download this WPE Pro
Step 1: Select target program
Start your Ragnarok Online client. Do not do anything yet.
Start WPE/WPE Pro. First you must tell it what program's data you want to sniff. Click on the little arrow besides the "Target program" button, and select the program name of your Ragnarok Online client. This is usually ragexe.exe, or sakexe.exe (if you're playing with the Sakray client). If you play on a private server, the program name may be different.
Step 2: Start sniffing
Click on the "Play" button to start sniffing packets.
Step 3: Login with your Ragnarok Online client
Go back to the Ragnarok Online client. Type in some random gibberish in your login dialog, and press Enter. It doesn't matter what you put in the ID and Password fields, as long as they're both more than 3 characters.
You only have to press Enter, nothing more. It doesn't matter whether the login succeeded or failed.
Step 4: Stop sniffing
Go back to WPE. Click on the "Stop" button. A subwindow will appear in WPE. You can now close the Ragnarok Online window.
Step 5: Analyze
The Ragnarok Online client sent some data to the Ragnarok Online server. This data contains all the information we need. (In this example, I used the iRO client to login. All example information here applies only to iRO Chaos/Loki.)
- The text under the Destination column is the IP address and the port number of the Ragnarok Online server.
In this case, the IP is 184.108.40.206, and the port number is 6900.
- The column in the middle (starting from "64 00") shows the bytes that the Ragnarok Online client tried to send to the server. The third byte is the server version number. However, it's in hexadecimal. You need to convert it to a decimal number, by using a calculator that supports hexadecimal.
In this case, the server version number is 18 (hexadecimal 12 is decimal 18).
- The last byte is the master version number. This number is also in hexadecimal. In this case, our master version number is 1.
So the information that we have gather in this example is as follows:
- IP: 220.127.116.11
- Port: 6900
- Master version number: 1
- Version number: 18
In Kore's configuration file, we put this:
master_name_0 (Put your server name here)
Information are from the following: