|
You last visited: Today at 17:34
Advertisement
hacking?
Discussion on hacking? within the Dekaron forum part of the MMORPGs category.
03/04/2009, 04:38
|
#1
|
elite*gold: 0
Join Date: Sep 2008
Posts: 418
Received Thanks: 161
|
hacking?
ok i think this is wrong section
sry mod if it is
couldnt find the right place for it
how do u find addresses and stuff for 2moons
i really dont wanna just do tutorials all the time on how to make it
but i wanna know how did they find the addreses n such to make the hack
and how did they learn to make it
eh i dont know how to explain it more throughly
tats all
once again sry if its in the wrong section
plz move if it is
|
|
|
03/04/2009, 05:00
|
#2
|
elite*gold: 20
Join Date: Jan 2008
Posts: 1,346
Received Thanks: 354
|
ok heres 4.6.17 script for none aggro the new addresses
Code:
[ENABLE]
alloc(newmem,1024)
label(returnhere)
label(originalcode)
label(exit)
0053DB4A:
jmp newmem
nop
nop
returnhere:
newmem:
originalcode:
movzx eax,word ptr [esi+00000154]
//mov eax,01
//mov word ptr [esi+00000156],ax
mov [esi+00000070],40c00000 // speed mob [esi+70]
//40c00000 = 6 lv 1
//41400000 = 12 lv 2
//41c00000 = 24 lv 3
mov byte ptr [esi+00000174],0000 // malee attack range = 0
mov byte ptr [esi+00000244],0000 // magic attack range = 0
mov [esi+00000240],0000000 //other attack range = 0
mov [esi+0000023c],0000000 //other attack range = 0
mov [esi+00000238],0000000 //other attack range = 0
mov eax,03
mov word ptr [esi+00000154],ax
exit:
jmp returnhere
[DISABLE]
dealloc(newmem)
0053DB4A:
movzx eax,word ptr [esi+00000154]
so thats current but anyway to find it again, look at where it says original code
originalcode:
movzx eax,word ptr [esi+00000154]
you open ollydbg and open unpacked dekaron.exe then you search for that command or commands (depends how much there is for originalcode) so ctrl+f then paste movzx eax,word ptr [esi+154], to know if you found the write address you should look at the old unpacked dek.exe you had the right address for and go to that address then compare to see if the commands around it is the same.
|
|
|
03/04/2009, 05:20
|
#3
|
elite*gold: 0
Join Date: Aug 2008
Posts: 51
Received Thanks: 2
|
Quote:
Originally Posted by bottomy
ok heres 4.6.17 script for none aggro the new addresses
Code:
[ENABLE]
alloc(newmem,1024)
label(returnhere)
label(originalcode)
label(exit)
0053DB4A:
jmp newmem
nop
nop
returnhere:
newmem:
originalcode:
movzx eax,word ptr [esi+00000154]
//mov eax,01
//mov word ptr [esi+00000156],ax
mov [esi+00000070],40c00000 // speed mob [esi+70]
//40c00000 = 6 lv 1
//41400000 = 12 lv 2
//41c00000 = 24 lv 3
mov byte ptr [esi+00000174],0000 // malee attack range = 0
mov byte ptr [esi+00000244],0000 // magic attack range = 0
mov [esi+00000240],0000000 //other attack range = 0
mov [esi+0000023c],0000000 //other attack range = 0
mov [esi+00000238],0000000 //other attack range = 0
mov eax,03
mov word ptr [esi+00000154],ax
exit:
jmp returnhere
[DISABLE]
dealloc(newmem)
0053DB4A:
movzx eax,word ptr [esi+00000154]
so thats current but anyway to find it again, look at where it says original code
originalcode:
movzx eax,word ptr [esi+00000154]
you open ollydbg and open unpacked dekaron.exe then you search for that command or commands (depends how much there is for originalcode) so ctrl+f then paste movzx eax,word ptr [esi+154], to know if you found the write address you should look at the old unpacked dek.exe you had the right address for and go to that address then compare to see if the commands around it is the same.
|
after i do the search of *movzx eax,word ptr [esi+154]* what i have to do, plz help me
|
|
|
03/04/2009, 06:07
|
#4
|
elite*gold: 0
Join Date: Sep 2008
Posts: 418
Received Thanks: 161
|
Quote:
Originally Posted by bottomy
ok heres 4.6.17 script for none aggro the new addresses
Code:
[ENABLE]
alloc(newmem,1024)
label(returnhere)
label(originalcode)
label(exit)
0053DB4A:
jmp newmem
nop
nop
returnhere:
newmem:
originalcode:
movzx eax,word ptr [esi+00000154]
//mov eax,01
//mov word ptr [esi+00000156],ax
mov [esi+00000070],40c00000 // speed mob [esi+70]
//40c00000 = 6 lv 1
//41400000 = 12 lv 2
//41c00000 = 24 lv 3
mov byte ptr [esi+00000174],0000 // malee attack range = 0
mov byte ptr [esi+00000244],0000 // magic attack range = 0
mov [esi+00000240],0000000 //other attack range = 0
mov [esi+0000023c],0000000 //other attack range = 0
mov [esi+00000238],0000000 //other attack range = 0
mov eax,03
mov word ptr [esi+00000154],ax
exit:
jmp returnhere
[DISABLE]
dealloc(newmem)
0053DB4A:
movzx eax,word ptr [esi+00000154]
so thats current but anyway to find it again, look at where it says original code
originalcode:
movzx eax,word ptr [esi+00000154]
you open ollydbg and open unpacked dekaron.exe then you search for that command or commands (depends how much there is for originalcode) so ctrl+f then paste movzx eax,word ptr [esi+154], to know if you found the write address you should look at the old unpacked dek.exe you had the right address for and go to that address then compare to see if the commands around it is the same.
|
ok thx for showing me how to do it but
wat i mean is
how did they know movzx eax,word ptr [esi+00000154]
was gonna be non agro
like how do they find stuff like that and such
i dunno if this is clear
its kind of hard to explain
|
|
|
|
Similar Threads
|
Dragonica Hacking communities Hacking Methods?
07/24/2009 - Dragonica - 8 Replies
Sup Guys I'm Unzubaru and a member of MPC/(now) ElitePvpers.
I was just wandering what methods you used for hacking here? I see you use the actual client for most hacks which means you ar rather advanced at ASM workings? Correct? I can also see that the possible hacks are this (with a few bugs of course): Vacuum Hack, Speed Hack, Super Jump Hack, Freeze Jump hack, No Cool-down, Teleport and i think definetly Damage Hack (Editting packets).
I just wanted to know what methods are used to get...
|
we had hacking the longju server! [chinese hacking group]
10/10/2008 - Metin2 Private Server - 30 Replies
Hello,
I see this is a realy great board and I want say you that we have the longju server files. We are a chinese hacking group from Beijing. I say this cause we search Player when they cheat. We want repair this gaps and make lot of updates. This server is coming for you in November. When you have questions then write this and I try to answer.
sorry for my bad english:(
xu
|
about vac hacking?
09/05/2008 - Dekaron - 2 Replies
At any chance is it safe to vac hack in dungeons such as crespo dungeon?
|
v.52 hacking
04/09/2008 - MapleStory - 7 Replies
Needed Files:
GG_CRC: http: //rapidshare.com/files/101311432/Rev_1152.rar.html
Moonlight Engine: MoonLight_Engine_1148.11.rar - MoonLight Engine 1148.11 - BADONGO
V.52 CT Mikles V.52 CT.rar
Credits: Crc_Bypass - Love
V52 Ct - Forgotten.
Moon Light - Not sure....
|
All times are GMT +2. The time now is 17:34.
|
|