Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Dekaron
You last visited: Today at 17:34

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



hacking?

Discussion on hacking? within the Dekaron forum part of the MMORPGs category.

Reply
 
Old   #1
 
Alleyn's Avatar
 
elite*gold: 0
Join Date: Sep 2008
Posts: 418
Received Thanks: 161
hacking?

ok i think this is wrong section
sry mod if it is
couldnt find the right place for it

how do u find addresses and stuff for 2moons
i really dont wanna just do tutorials all the time on how to make it
but i wanna know how did they find the addreses n such to make the hack
and how did they learn to make it

eh i dont know how to explain it more throughly
tats all

once again sry if its in the wrong section
plz move if it is
Alleyn is offline  
Old 03/04/2009, 05:00   #2
 
elite*gold: 20
Join Date: Jan 2008
Posts: 1,346
Received Thanks: 354
ok heres 4.6.17 script for none aggro the new addresses


Code:
[ENABLE]
alloc(newmem,1024)
label(returnhere)
label(originalcode)
label(exit)

0053DB4A:
jmp newmem
nop
nop
returnhere:

newmem:

originalcode:
movzx eax,word ptr [esi+00000154]

//mov eax,01
//mov word ptr [esi+00000156],ax
mov [esi+00000070],40c00000 // speed mob  [esi+70] 
//40c00000 = 6 lv 1
//41400000 = 12 lv 2
//41c00000 = 24 lv 3
mov byte ptr [esi+00000174],0000 // malee attack range = 0
mov byte ptr [esi+00000244],0000 // magic attack range = 0
mov [esi+00000240],0000000 //other attack range = 0
mov [esi+0000023c],0000000 //other attack range = 0
mov [esi+00000238],0000000 //other attack range = 0
mov eax,03
mov word ptr [esi+00000154],ax

exit:
jmp returnhere

[DISABLE]
dealloc(newmem)

0053DB4A:
movzx eax,word ptr [esi+00000154]

so thats current but anyway to find it again, look at where it says original code

originalcode:
movzx eax,word ptr [esi+00000154]

you open ollydbg and open unpacked dekaron.exe then you search for that command or commands (depends how much there is for originalcode) so ctrl+f then paste movzx eax,word ptr [esi+154], to know if you found the write address you should look at the old unpacked dek.exe you had the right address for and go to that address then compare to see if the commands around it is the same.
bottomy is offline  
Old 03/04/2009, 05:20   #3
 
elite*gold: 0
Join Date: Aug 2008
Posts: 51
Received Thanks: 2
Quote:
Originally Posted by bottomy View Post
ok heres 4.6.17 script for none aggro the new addresses


Code:
[ENABLE]
alloc(newmem,1024)
label(returnhere)
label(originalcode)
label(exit)

0053DB4A:
jmp newmem
nop
nop
returnhere:

newmem:

originalcode:
movzx eax,word ptr [esi+00000154]

//mov eax,01
//mov word ptr [esi+00000156],ax
mov [esi+00000070],40c00000 // speed mob  [esi+70] 
//40c00000 = 6 lv 1
//41400000 = 12 lv 2
//41c00000 = 24 lv 3
mov byte ptr [esi+00000174],0000 // malee attack range = 0
mov byte ptr [esi+00000244],0000 // magic attack range = 0
mov [esi+00000240],0000000 //other attack range = 0
mov [esi+0000023c],0000000 //other attack range = 0
mov [esi+00000238],0000000 //other attack range = 0
mov eax,03
mov word ptr [esi+00000154],ax

exit:
jmp returnhere

[DISABLE]
dealloc(newmem)

0053DB4A:
movzx eax,word ptr [esi+00000154]

so thats current but anyway to find it again, look at where it says original code

originalcode:
movzx eax,word ptr [esi+00000154]

you open ollydbg and open unpacked dekaron.exe then you search for that command or commands (depends how much there is for originalcode) so ctrl+f then paste movzx eax,word ptr [esi+154], to know if you found the write address you should look at the old unpacked dek.exe you had the right address for and go to that address then compare to see if the commands around it is the same.
after i do the search of *movzx eax,word ptr [esi+154]* what i have to do, plz help me

axtranti is offline  
Old 03/04/2009, 06:07   #4
 
Alleyn's Avatar
 
elite*gold: 0
Join Date: Sep 2008
Posts: 418
Received Thanks: 161
Quote:
Originally Posted by bottomy View Post
ok heres 4.6.17 script for none aggro the new addresses


Code:
[ENABLE]
alloc(newmem,1024)
label(returnhere)
label(originalcode)
label(exit)

0053DB4A:
jmp newmem
nop
nop
returnhere:

newmem:

originalcode:
movzx eax,word ptr [esi+00000154]

//mov eax,01
//mov word ptr [esi+00000156],ax
mov [esi+00000070],40c00000 // speed mob  [esi+70] 
//40c00000 = 6 lv 1
//41400000 = 12 lv 2
//41c00000 = 24 lv 3
mov byte ptr [esi+00000174],0000 // malee attack range = 0
mov byte ptr [esi+00000244],0000 // magic attack range = 0
mov [esi+00000240],0000000 //other attack range = 0
mov [esi+0000023c],0000000 //other attack range = 0
mov [esi+00000238],0000000 //other attack range = 0
mov eax,03
mov word ptr [esi+00000154],ax

exit:
jmp returnhere

[DISABLE]
dealloc(newmem)

0053DB4A:
movzx eax,word ptr [esi+00000154]

so thats current but anyway to find it again, look at where it says original code

originalcode:
movzx eax,word ptr [esi+00000154]

you open ollydbg and open unpacked dekaron.exe then you search for that command or commands (depends how much there is for originalcode) so ctrl+f then paste movzx eax,word ptr [esi+154], to know if you found the write address you should look at the old unpacked dek.exe you had the right address for and go to that address then compare to see if the commands around it is the same.


ok thx for showing me how to do it but
wat i mean is
how did they know movzx eax,word ptr [esi+00000154]
was gonna be non agro
like how do they find stuff like that and such
i dunno if this is clear
its kind of hard to explain
Alleyn is offline  
Reply


Similar Threads Similar Threads
Dragonica Hacking communities Hacking Methods?
07/24/2009 - Dragonica - 8 Replies
Sup Guys I'm Unzubaru and a member of MPC/(now) ElitePvpers. I was just wandering what methods you used for hacking here? I see you use the actual client for most hacks which means you ar rather advanced at ASM workings? Correct? I can also see that the possible hacks are this (with a few bugs of course): Vacuum Hack, Speed Hack, Super Jump Hack, Freeze Jump hack, No Cool-down, Teleport and i think definetly Damage Hack (Editting packets). I just wanted to know what methods are used to get...
we had hacking the longju server! [chinese hacking group]
10/10/2008 - Metin2 Private Server - 30 Replies
Hello, I see this is a realy great board and I want say you that we have the longju server files. We are a chinese hacking group from Beijing. I say this cause we search Player when they cheat. We want repair this gaps and make lot of updates. This server is coming for you in November. When you have questions then write this and I try to answer. sorry for my bad english:( xu
about vac hacking?
09/05/2008 - Dekaron - 2 Replies
At any chance is it safe to vac hack in dungeons such as crespo dungeon?
v.52 hacking
04/09/2008 - MapleStory - 7 Replies
Needed Files: GG_CRC: http: //rapidshare.com/files/101311432/Rev_1152.rar.html Moonlight Engine: MoonLight_Engine_1148.11.rar - MoonLight Engine 1148.11 - BADONGO V.52 CT Mikles V.52 CT.rar Credits: Crc_Bypass - Love V52 Ct - Forgotten. Moon Light - Not sure....



All times are GMT +2. The time now is 17:34.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.