Quote:
Originally Posted by Plastic
The DLL was meant to bypass the hash check they do on files ( SCR_BASE.XP / NDTEXTDB_US.XSD / etc. ) loaded by the client. It doesn't work as intended anymore because with the method in the DLL they will disconnect you as you finish loading a character.
|
Reading the source files, and I just see a battle state log enabler.
Perhaps i missed it on the compiled DLL's..
//here is the current address for redfox version, this code does not boot me from the game.. i think your injection method or createthread api usage may be the issue.. Also could be that ur signature scanner is leaving behind a unique byte signature they can use to blacklist your dll.
Code:
DWORD dwBase = (DWORD)GetModuleHandleA(NULL), dwPtr = dwBase + 0x00462E5C;
DWORD* pdwND1Hash = reinterpret_cast< DWORD* > (*reinterpret_cast< DWORD* >(dwPtr));
DWORD dwProt = PAGE_EXECUTE_READWRITE;
VirtualProtect(pdwND1Hash, 4, dwProt, &dwProt);
oND1Hash = (ND1Hash_t)*pdwND1Hash;
*pdwND1Hash = (DWORD)HookedND1Hash;
VirtualProtect(pdwND1Hash, 4, dwProt, &dwProt);
dwPtr = dwBase + 0x003B83FF;
g_bWriteLog = reinterpret_cast< DWORD* > (*reinterpret_cast< DWORD* >(dwPtr));
*g_bWriteLog = TRUE;
You dont need to go too much engine deep to bypass the ( SCR_BASE.XP / NDTEXTDB_US.XSD / etc ) check.. its actually pretty easy
However good work, love your coding style.
Btw what would you gain modifying these files anyway?