Register for your free account! | Forgot your password?

You last visited: Today at 07:55

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



How To Find Addys In Warrock

Discussion on How To Find Addys In Warrock within the WarRock Guides, Tutorials & Modifications forum part of the WarRock category.

Reply
 
Old   #1
 
th3man0f22's Avatar
 
elite*gold: LOCKED
Join Date: Dec 2009
Posts: 494
Received Thanks: 245
How To Find Addys In Warrock

Short example how to find x,y,z, offsets and serverpointer


English

Open Unpacked WarRock , I'm using Ida Pro , and search for
text string ( %.1f, %.1f, %.1f ) , and it will appear in sub like
this below , I added commands what is what ,



PHP Code:

push esi
call sub_4E6430
add esp, 4
test eax, eax
jz short loc_4A1641
mov ecx, dword_B19D98 ; << Server Pointer (0xB19D98 )
cmp esi, [ecx+0E0AACh]
mov ecx, offset asc_983EC0 ; "*"
jz short loc_4A1606
mov ecx, offset byte_97F6A4

fld dword ptr [eax+2C4h] ; << Offset Z (0x2C4)
sub esp, 18h
fstp qword ptr [esp+10h]
lea edx, [esi+4]
fld dword ptr [eax+2C0h] ; << Offset Y (super jump) (0x2C0)
fstp qword ptr [esp+8]
fld dword ptr [eax+2BCh] ; << Offset X(0x2BC)
mov eax, dword_AD5CD0
fstp qword ptr [esp]
push esi
push ecx
push offset aS2dSPos_1f_1f_ ; "%s%2d's Pos : ( %.1f, %.1f, %.1f )"
push edx
push eax
call sub_7C1310
add esp, 2Ch
jmp short loc_4A1659



Deutsch

Kleines Beispiel zum Finden der X Y und Z offsets und des Serverpointers

öffne die unpacked Warrock.exe mit einem Debugger wie Ida Pro, und suche nach
"text string ( %.1f, %.1f, %.1f )" und es wird dir etwas in der Art angezeigt, ich habe noch die Funktionen hinzugefügt was was ist:


Code:

push esi
call sub_4E6430
add esp, 4
test eax, eax
jz short loc_4A1641
mov ecx, dword_B19D98 ; << Server Pointer (0xB19D98 )
cmp esi, [ecx+0E0AACh]
mov ecx, offset asc_983EC0 ; "*"
jz short loc_4A1606
mov ecx, offset byte_97F6A4

fld dword ptr [eax+2C4h] ; << Offset Z (0x2C4)
sub esp, 18h
fstp qword ptr [esp+10h]
lea edx, [esi+4]
fld dword ptr [eax+2C0h] ; << Offset Y (super jump) (0x2C0)
fstp qword ptr [esp+8]
fld dword ptr [eax+2BCh] ; << Offset X(0x2BC)
mov eax, dword_AD5CD0
fstp qword ptr [esp]
push esi
push ecx
push offset aS2dSPos_1f_1f_ ; "%s%2d's Pos : ( %.1f, %.1f, %.1f )"
push edx
push eax
call sub_7C1310
add esp, 2Ch
jmp short loc_4A1659

Special Thanks to Vistaxxxl
th3man0f22 is offline  
Thanks
12 Users
Old 09/01/2010, 12:30   #2
 
vistaxxxl's Avatar
 
elite*gold: 0
Join Date: Jun 2010
Posts: 74
Received Thanks: 46
year the first Guide for Addylogging in Warrock
I'll test it later.

MFG vistaxxxl
vistaxxxl is offline  
Old 09/01/2010, 12:45   #3
 
MilchEis's Avatar
 
elite*gold: LOCKED
Join Date: Aug 2010
Posts: 117
Received Thanks: 15
Danke...aber leider kann ich nicht so gut englisch...wird wohl ne weile dauern bis ich das verstanden habe
MilchEis is offline  
Old 09/01/2010, 14:13   #4
 
vistaxxxl's Avatar
 
elite*gold: 0
Join Date: Jun 2010
Posts: 74
Received Thanks: 46
Talking

ok ich übersetze mal:


Quote:
Kleines Beispiel zum Finden der X Y und Z offsets und des Serverpointers

öffne die unpacked Warrock.exe mit einem Debugger wie Ida Pro, und suche nach
"text string ( %.1f, %.1f, %.1f )" und es wird dir etwas in der Art angezeigt, ich habe noch die Funktionen hinzugefügt was was ist:


Code:
push esi
call sub_4E6430
add esp, 4
test eax, eax
jz short loc_4A1641
mov ecx, dword_B19D98 ; << Server Pointer (0xB19D98 )
cmp esi, [ecx+0E0AACh]
mov ecx, offset asc_983EC0 ; "*"
jz short loc_4A1606
mov ecx, offset byte_97F6A4

fld dword ptr [eax+2C4h] ; << Offset Z (0x2C4)
sub esp, 18h
fstp qword ptr [esp+10h]
lea edx, [esi+4]
fld dword ptr [eax+2C0h] ; << Offset Y (super jump) (0x2C0)
fstp qword ptr [esp+8]
fld dword ptr [eax+2BCh] ; << Offset X(0x2BC)
mov eax, dword_AD5CD0
fstp qword ptr [esp]
push esi
push ecx
push offset aS2dSPos_1f_1f_ ; "%s%2d's Pos : ( %.1f, %.1f, %.1f )"
push edx
push eax
call sub_7C1310
add esp, 2Ch
jmp short loc_4A1659
bitte nicht vergessen es ist sein tutorial/guide also gibt ihm auch ein Thanks falls ihr (fast) kein Englisch könnt und mir ein thx gegeben habt.

MFG vistaxxxl
vistaxxxl is offline  
Thanks
3 Users
Old 09/01/2010, 14:27   #5
 
elite*gold: 50
Join Date: Feb 2009
Posts: 4,545
Received Thanks: 480
Es gibt genug Programme die die Addys selber loggen....
BloodyMustang is offline  
Old 09/01/2010, 21:12   #6
 
vistaxxxl's Avatar
 
elite*gold: 0
Join Date: Jun 2010
Posts: 74
Received Thanks: 46
Quote:
Es gibt genug Programme die die Addys selber loggen....
nur allzu schade, dass davon im moment KEINS funktioniert

MFG vistaxxl
vistaxxxl is offline  
Old 09/01/2010, 23:18   #7
 
Lucky Strike™'s Avatar
 
elite*gold: 2
Join Date: May 2010
Posts: 2,913
Received Thanks: 1,565
Really nice guide, thank you

But could you pls explain, how do you know, what´s the serverpointer string, and whats the ofs_z string? I don´t really get it.
Lucky Strike™ is offline  
Old 09/02/2010, 01:24   #8
 
HackTec's Avatar
 
elite*gold: 21
Join Date: Apr 2010
Posts: 1,725
Received Thanks: 1,237
PHP Code:
#define ADR_PLAYERPOINTER 0x00AA6DB8 //Found at: 0x00417D8E ( WarRock.exe[0x00400000] + 0x00017D8E )
#define ADR_SERVERPOINTER 0x009A1DD8 //Found at: 0x004143AE ( WarRock.exe[0x00400000] + 0x000143AE )
#define ADR_BASEPOINTER 0x009DC1D8 //Found at: 0x00469511 ( WarRock.exe[0x00400000] + 0x00069511 )
#define ADR_HEALTHPOINTER 0x009DDD64 //Found at: 0x00421E6C ( WarRock.exe[0x00400000] + 0x00021E6C )
#define ADR_USERBASE 0x00AA6E04 //Found at: 0x004148A6 ( WarRock.exe[0x00400000] + 0x000148A6 )
#define ADR_CLASSBASE 0x0080DCD4 //Found at: 0x00423CC8 ( WarRock.exe[0x00400000] + 0x00023CC8 )
#define ADR_WEAPONBASE 0x008F3CBC //Found at: 0x0040CEE3 ( WarRock.exe[0x00400000] + 0x0000CEE3 )
#define Team_Base 0x009DDEA0 //Found at: 0x00415162 ( WarRock.exe[0x00400000] + 0x00015162 )
#define ADR_SLOTBASE 0x000D02D8 //Found at: 0x0051F5C9 ( WarRock.exe[0x00400000] + 0x0011F5C9 )
#define ADR_ViewAngles 0x008ED4C4 //Found at: 0x0040CF0F ( WarRock.exe[0x00400000] + 0x0000CF0F )
#define ADR_SPEED 0x007B55C4 //Found at: 0x004DFC9D ( WarRock.exe[0x00400000] + 0x000DFC9D )
#define ADR_GLASSWALLS 0x008F3758 //Found at: 0x00463B45 ( WarRock.exe[0x00400000] + 0x00063B45 )
#define ADR_NOSPREAD 0x008ED878 //Found at: 0x0045CBDE ( WarRock.exe[0x00400000] + 0x0005CBDE )
#define ADR_NOBOUNDS1 0x00912E44 //Found at: 0x00457446 ( WarRock.exe[0x00400000] + 0x00057446 )
#define ADR_NOBOUNDS2 0x00912E3C //Found at: 0x00457483 ( WarRock.exe[0x00400000] + 0x00057483 )
#define ADR_NOBOUNDS3 0x00912E40 //Found at: 0x0045747B ( WarRock.exe[0x00400000] + 0x0005747B )
#define ADR_INSTANTSPAWN1 0x0095B5F0 //Found at: 0x0046A3E0 ( WarRock.exe[0x00400000] + 0x0006A3E0 )
#define ADR_INSTANTSPAWN2 0x008F0DB4 //Found at: 0x0041EB00 ( WarRock.exe[0x00400000] + 0x0001EB00 )
#define ADR_CQCSPAWN 0x0080DCC4 //Found at: 0x0042E6E7 ( WarRock.exe[0x00400000] + 0x0002E6E7 )
#define ADR_SCOPE 0x0080DCD4 //Found at: 0x00417CF4 ( WarRock.exe[0x00400000] + 0x00017CF4 )
#define Near_Fog 0x008F3754 //Found at: 0x0043B9AB ( WarRock.exe[0x00400000] + 0x0003B9AB )
#define Far_Fog 0x008F3758 //Found at: 0x00463B45 ( WarRock.exe[0x00400000] + 0x00063B45 )
#define ADR_GMWARNING 0x0080DCFC //Found at: 0x00417CED ( WarRock.exe[0x00400000] + 0x00017CED )
#define ADR_FastLockon 0x008ED888 //Found at: 0x0043147B ( WarRock.exe[0x00400000] + 0x0003147B )
#define ADR_ImDrunk 0x00957C68 //Found at: 0x00422622 ( WarRock.exe[0x00400000] + 0x00022622 )
#define ADR_FASTAMMO 0x008F0D1C //Found at: 0x0042B26F ( WarRock.exe[0x00400000] + 0x0002B26F )
#define ADR_FASTFLAG 0x008F0D28 //Found at: 0x0045273A ( WarRock.exe[0x00400000] + 0x0005273A )
#define ADR_FASTHEALTH 0x008F0D20 //Found at: 0x0042B2C6 ( WarRock.exe[0x00400000] + 0x0002B2C6 )
#define ADR_FASTREPAIR 0x008F0D14 //Found at: 0x0042B32A ( WarRock.exe[0x00400000] + 0x0002B32A )
#define ADR_ANTIAFK 0x0045E999 //WarRock.exe[0x00400000] + 0x0005E999
#define ADR_HIGHVIEW 0x007A89CC //Found at: 0x00421AE6 ( WarRock.exe[0x00400000] + 0x00021AE6 )
#define ADR_WEAPONGRAVITY 0x007AAEF0 //Found at: 0x0042C528 ( WarRock.exe[0x00400000] + 0x0002C528 )
#define ADR_TRIGGERBOT 0x0080DD30 //Found at: 0x005136BC ( WarRock.exe[0x00400000] + 0x001136BC ) 

keine aktuellen addys aber da steht ja noch mehr wers gebrauchen kann ^^
HackTec is offline  
Old 09/02/2010, 23:20   #9
 
Inqlorius's Avatar
 
elite*gold: 0
Join Date: Feb 2010
Posts: 1,007
Received Thanks: 801
Leute das ist schon alt....

Man Findet OFS X Y Z nichtmehr unter "text string ( %.1f, %.1f, %.1f )" ...

Was meint ihr warum die meisten Addylogger nimmer gehen..
Inqlorius is offline  
Old 09/03/2010, 06:53   #10
 
b0bh34d's Avatar
 
elite*gold: 10
Join Date: Sep 2010
Posts: 1,885
Received Thanks: 193
gibt ja adddy updater
b0bh34d is offline  
Old 12/22/2010, 18:38   #11
 
elite*gold: 0
Join Date: Feb 2010
Posts: 86
Received Thanks: 52
weis den jemand die neuen text strings ? ich breuchte nen paar,
Hacker246 is offline  
Reply


Similar Threads Similar Threads
[Guide]Find WarRock Addys
01/17/2011 - WarRock Guides, Tutorials & Modifications - 18 Replies
^This. Hallo e*pvplers, in diesem Guide zeige ich euch wie ihr Addys in WarRock findet. dazu benötigen wir : Dumped WarRock.exe (link wird wöchentlich geupdated ;) ) OllyDbg
Someone give me a guide to find Addys for no cooldown etc.
09/12/2010 - Cabal Private Server - 1 Replies
i been searching this forum and google but i get helpless threads. Help please ><.
[WarRock] Addys 01.04.10, Update Addys and Offsets
04/01/2010 - Cabal Hacks, Bots, Cheats, Exploits & Macros - 2 Replies
Hallo diese Addys habe ich von anderen forum kopiert nicht denken ich habe sie selbst wollte sie für euch rein packen <3.. Hier die Addys: Wenn du 0x00 da stehen hast kann es sein, dass du die 00 wegnehemen musst.



All times are GMT +2. The time now is 07:55.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.