[Guide] Client Based Packet Injection in Silkroad

08/14/2009 22:48 soadmania#16
i suggest proxy+analyzer. it s so easy.
08/15/2009 08:51 ReillyKlevre#17
Quote:
Originally Posted by maxbot View Post
Yeah, that's how everyone probably does it for C->S opcodes. For those who don't know how to get them anyway, here are binary strings for some most used C->S opcodes (I guess they haven't changed) :
Not everyone :x

The most important thing to notice is that no new opcodes have been added or deleted from 1.203 - 1.205. What this means is that the order of opcodes remains the same in all clients.

For Server to Client opcodes it's pretty easy to get because there's a switch table which you can parse easily, as for Client to Server packets since they all injected they need to be called by the function that injectes packets, this is fairly easy to distinguish by looking a few similar functions for Client to Server packets.

And since this has mostly been done manually by everyone before and since a few weeks have passed after the last update, no real harm can be done by posting this I guess:
[Only registered and activated users can see links. Click Here To Register...]
08/15/2009 13:07 maxbot#18
@Klevre

Notice the word 'probably' :P

I knew you weren't using binary strings since you're too lazy to search for all C->S opcodes on that way :p
08/17/2009 03:09 soadmania#19
im tired of that creepy errors. there s no Resource in my Add list.

[Only registered and activated users can see links. Click Here To Register...]
08/17/2009 03:28 pushedx#20
Quote:
Originally Posted by soadmania View Post
im tired of that creepy errors. there s no Resource in my Add list.
Visual Studio 2008 express edition does not support the GUI editing features that Visual Studio 2008 has. You have to either not use GUIs, create your own GUI through the Win32 API instead, or "upgrade" to Visual Studio 2008.
08/19/2009 14:48 hack0r89#21
Quote:
Originally Posted by ReillyKlevre View Post
And since this has mostly been done manually by everyone before and since a few weeks have passed after the last update, no real harm can be done by posting this I guess:
[Only registered and activated users can see links. Click Here To Register...]
nice one
you used a sig based opcode finder, didnt you?
01/10/2010 15:30 konserwa#22
some one can give source to show how it work ?
01/27/2011 18:44 Scarabol#23
Hey guys,

i need some help with this:
Code:
	// The location of the hook
	// Binary Search pattern for Olly: 8B 11 8B 42 2C 57 
	// MOV EDX,[ECX]
	// MOV EAX,[EDX+2C] <- Patch
	// PUSH EDI
	#define SEND_HOOK 0x7418A2
What does "Patch" in line 4 mean?
Where can i get the SEND_HOOK Code from?

I already updated
#define SEND_ECX 0xF45830
#define SEND_CALL 0x801680
but i cant get any value for SEND_HOOK

Thanks in advance
Scarabol
01/27/2011 19:16 bootdisk#24
This may be?

Quote:
// The location of the hook
// Binary Search pattern for Olly: 8B 11 8B 42 2C 57
01/27/2011 22:14 Scarabol#25
Yes, i looked for that but all that olly says is:
Code:
CPU Disasm
Address   Hex dump          Command                                  Comments
0082D081  |.  8B11          MOV EDX,DWORD PTR DS:[ECX]
0082D083  |.  8B42 2C       MOV EAX,DWORD PTR DS:[EDX+2C]
0082D086  |.  57            PUSH EDI
Thanks in advance
Scarabol
01/27/2011 22:39 lesderid#26
>.<
01/28/2011 06:44 Scarabol#27
???
06/21/2013 14:57 cyberninjah#28
anyone have the binary search patterns for packet receive ?
06/22/2013 00:34 vitalka#29
edxloader source have this
08/01/2013 13:21 cyberninjah#30
i try to update this so it works with the vsro clients but i keep failing in finding the right addy's anyone succeed to update this for vsro??