From d10fd23db2d55d4f55734b88d155798d5f15dc08 Mon Sep 17 00:00:00 2001 From: Youness Alaoui Date: Tue, 5 Jan 2016 14:42:31 -0500 Subject: [PATCH] update README file --- README.md | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index ec1393a..e783951 100644 --- a/README.md +++ b/README.md @@ -1,15 +1,20 @@ # Summoners War Monsters & Runes Parser -This tool will parse pcap files captured from the initial Summoners War login data and extract information on the monsters and runes of the user. +This tool will parse data captured from the initial Summoners War login data and extract information on the monsters and runes of the user. This tool was created with a single purpose: Exporting the runes so it can be used with external tools, such as the Rune Optimizer by Redeemer40 available here : http://www.graphactory.eu/sw/ -# Data capture +## SWProxy +The easiest and safest method is to use the SWProxy application which will run a small proxy server on your machine. You will then need to set the proxy settings in your Android or IOS device to the IP and Port displayed by SWProxy and wait for the data to appear. +In order to get login data, make sure you quit Summoners War and log back in with the proxy enabled. + +## SWParser +The SWParser will parse a pcap file containing a network capture of the Summoners War login information. You will need a pcap file that can be captured either by configuring a proxy (such as Charles or Fiddler) and capturing the pcap file with Wireshark or using a capture application such as tPacketCapture. -See https://www.reddit.com/r/summonerswar/comments/3yzb02/releasing_the_sw_monsters_runes_extractor/cyi2adn for instructions on how to capture the pcap file on IOS or Android using a proxy (safest option). +See https://www.reddit.com/r/summonerswar/comments/3yzb02/releasing_the_sw_monsters_runes_extractor/cyi2adn for instructions on how to capture the pcap file on IOS or Android using a proxy and wireshark. See https://youtu.be/fimW1n5PSX0 for instructions on how to capture the pcap file on Android using tPacketCapture. -## Parsing the data +### Parsing the data Run the SWParser.py with the pcap file as an argument. It will parse the captured data, find the login information and export a few files with all the information on your account. That's all you need to do. @@ -28,11 +33,8 @@ The monsters are listed in the same order they would appear in your box if you s The monsters listed for a visited friend are in the same order as his box as well (which is not actually sorted by grade). ## Visiting friends -You can visit friends (or people from chat, or arena rankings, etc..) and the script will create a visit--monsters.csv file with all of their monsters (their equipped runes are also available but they are not exported). Note that their monsters that are in storage will also be visible in the CSV file even though the game doesn't show them. +You can visit friends (or people from chat, or arena rankings, etc..) and the script will create a visit--monsters.csv file with all of their monsters and their equipped runes. Note that their monsters that are in storage will also be visible in the CSV file even though the game doesn't show them. ## Optimizer data The optimizer.json file can be directly loaded on the Rune Optimizer app available here : http://www.graphactory.eu/sw/ Simply open the file with a text editor and copy/paste the data into the import section of the web app and press Import. - -## Monster names -Monsters are identified by their ID which is a 5 digit number. The first 3 digits uniquely identify the monster type, for example 101=Fairy, 102=Imp, 103=Pixie, etc.. The 4th digit is set to 1 when the monster is awakened and 0 when it's not, and the 5th digit represents the attribute (1=Water, 2=Fire, 3=Wind, 4=Light, 5=Dark), so for example, 10102=Fire Fairy, 10313=Shannon(Awakened Wind Pixie)