find the function that builds the packet to the server that grabs your IP address (ez winsock call, just breakpoint it and figure out when it's called).
Now just write some code in OllyDbg that modifies one of those octets to be the result of a call to rand() after you call srand with the GetTickCount value (it's just a memory offset btw). Copy the binary olly produces as a result of that assembly (after you've tested that it works), find that bit of code in a hex editor and hex those values in.
Then you have a modified .exe that randomly generates your local IP address (probably most likely the last octet or last two octets), thus you have a 1/256 or 1/65535 chance for a new client to get the same address as your first client.
I won't show you how to do this, but I have told you how and it is very possible, just figure it out. Perhaps someone will post a modified .exe that has the hard work done (for you leechers).
Now just write some code in OllyDbg that modifies one of those octets to be the result of a call to rand() after you call srand with the GetTickCount value (it's just a memory offset btw). Copy the binary olly produces as a result of that assembly (after you've tested that it works), find that bit of code in a hex editor and hex those values in.
Then you have a modified .exe that randomly generates your local IP address (probably most likely the last octet or last two octets), thus you have a 1/256 or 1/65535 chance for a new client to get the same address as your first client.
I won't show you how to do this, but I have told you how and it is very possible, just figure it out. Perhaps someone will post a modified .exe that has the hard work done (for you leechers).