For the new GunBound server run by Gravity Games, they use a unique patching system created using Electron.
Anyways, while packet-sniffing, the patcher connects to this URL to check for updates (note port 9627):
http://54.207.135.149:9627/files-update
I am guessing it stores files at this URL (lacking port):
http://54.207.135.149/files-update/
Right now there's no further GET response beyond "?" but the API shows this:
So breaking that API into an array:
Additional note: There is also a "version.txt" file in the root directory of the launcher. Whenever this file is modified or deleted (basically, at current time, if it doesn't say exactly "v0.1.0" inside of it), it will always attempt to download a new version.txt to replace it. Making the values higher or lower, doesn't matter, it will fix itself back to v0.1.0. Unsure what this file is used for at this time.
When attempting to send username/password data to the server, it sends encrypted packets to 54.94.2.93 on port 50715. At the moment, I don't have an account to test any further, so responses back from the server are incorrect credentials each time. I am curious if the patcher is talking to a Serv3 Broker/Center, or if it's something else entirely unique (likely), which then simply authenticates and gives the OK and command line args to launch the game client in game/gunbound.exe (which is technically the GME).
Anyways, while packet-sniffing, the patcher connects to this URL to check for updates (note port 9627):
http://54.207.135.149:9627/files-update
I am guessing it stores files at this URL (lacking port):
http://54.207.135.149/files-update/
Right now there's no further GET response beyond "?" but the API shows this:
JSON:
[
{
"name": "version.txt",
"version": "1",
"endpoint": "http://54.207.135.149/files-update/version.txt",
"hash": "f053ddb33a01ef331339f35d551e151926d9a008",
"filesize": ""
}
]
So breaking that API into an array:
- name: version.txt
- version: 1
- endpoint: http://54.207.135.149/files-update/version.txt
- hash: f053ddb33a01ef331339f35d551e151926d9a008
- filesize: *blank*
Additional note: There is also a "version.txt" file in the root directory of the launcher. Whenever this file is modified or deleted (basically, at current time, if it doesn't say exactly "v0.1.0" inside of it), it will always attempt to download a new version.txt to replace it. Making the values higher or lower, doesn't matter, it will fix itself back to v0.1.0. Unsure what this file is used for at this time.
When attempting to send username/password data to the server, it sends encrypted packets to 54.94.2.93 on port 50715. At the moment, I don't have an account to test any further, so responses back from the server are incorrect credentials each time. I am curious if the patcher is talking to a Serv3 Broker/Center, or if it's something else entirely unique (likely), which then simply authenticates and gives the OK and command line args to launch the game client in game/gunbound.exe (which is technically the GME).
Last edited: