
------
Initializing packet capture interface
pcapture.o: Using device eth0
*UDP PACKET*
Source MAC: 00:50:F2:35:41:A1
Destination MAC: FF:FF:FF:FF:FF:FF
Source Port: 3074
Destination Port: 3074
Payload: ffffffffffffff4d59832cb8d319da185df77dbbcda491e5f1d69a707f6e24d8ce649c4a1b748ddbd4519e3c4861251b9f4847cb2fb214b320d1410
*UDP PACKET*
Source MAC: 00:50:F2:35:41:A1
Destination MAC: FF:FF:FF:FF:FF:FF
Source Port: 3074
Destination Port: 3074
Payload: ffffffffffffffc260f98bd3127f2237303116399b8097b0f950acaccd33183623dbf52d5d97d7dc7a4a52e7135ea21baa8dd97ed3607e137cf60
*UDP PACKET*
Source MAC: 00:50:F2:35:41:A1
Destination MAC: FF:FF:FF:FF:FF:FF
Source Port: 3074
Destination Port: 3074
Payload: ffffffffffffffdc227e3c611e215b8336afe080e5172f43b26e851c45073fd8b6ceeb932bcc2521aadd9cdf71f16642c37273836bf67c437de00
------
I don't suppose anyone has analyzed the game packet payloads themselves? The tunnelling program is just shipping them across the wire so it doesn't need to know the contents, but it would be interesting.