WarRock EU - Code Snippets

06/29/2012 12:06 CyberVeezy :)#7306
Quote:
Originally Posted by BlackLegend™# View Post
Credits: Zu wem auch immer.(Ich glaube King nicht..)
-> Sofort beim Einloggen vom Server "Fremdprogramm entdeckt" bekommen.. ( Bypass )
06/29/2012 14:22 Angel-Piece#7307
Quote:
Originally Posted by CyberVeezy :) View Post
-> Sofort beim Einloggen vom Server "Fremdprogramm entdeckt" bekommen.. ( Bypass )
This is The Problem of a Copy & Paster ur All to stupid to get Something working
so if ur to stupid to get a working better learn C++ or learn to use google :)
06/29/2012 14:32 NikM#7308
In dieser Adresse (0x9457F) soll eigentlich der Wert des eax-Registers geändert werden, was in der oben stehenden Source nicht geschieht.
06/29/2012 14:32 Chown¡¡qhtz#7309
Quote:
Originally Posted by CyberVeezy :) View Post
-> Sofort beim Einloggen vom Server "Fremdprogramm entdeckt" bekommen.. ( Bypass )
Vielleicht schaffste es ja mit King7 Bypass ( :D )
Code:
ADR_HSCallBack1 0x7907a  // BYTE To Use 0xC3
ADR_HSCallBack2 0x09fa8  // BYTE To Use 0x74
ADR_HSNanoScan1 0x96863  // BYTE To Use 0x03,0xD2
ADR_HSNanoScan2 0x9457F  // BYTE To Use 0xB8,0x00,0x00,0x00,0x00


void DetouringHackShield (void)
{  
	DWORD hEhSvc = (DWORD)GetModuleHandle("EhSvc.dll");
	if ( hEhSvc !=0 )
	{
	 DWORD ADR_HSCallBack1 = Tools.SearchPattern(hEhSvc,0x11E000,"558BEC83EC??535657894DE0",ASM,0);
	 DWORD ADR_HSCallBack2 = Tools.SearchPattern(hEhSvc,0x11E000,"83C4??85DB75??55E8????????83C4??33??",ASM,5);	
	 DWORD ADR_HSNanoScan1 = Tools.SearchPattern(hEhSvc,0x11E000,"8B45??03C28945??837DDC??",ASM,3);	
	 DWORD ADR_HSNanoScan2 = Tools.SearchPattern(hEhSvc,0x11E000,"8B55??52E8????????83C4148945??837DE400",ASM,4);


				   BYTE bpJe         [1] = { 0x74 };
				   BYTE bpRetnA      [1] = { 0xC3 };

	Tools.BPPatching((void*)(ADR_HSCallBack2),bpJe,1);    //EhSvc.dll   CRC Check new actualy working
	Tools.BPPatching((void*)(ADR_HSCallBack1),bpRetnA,1); //EhSvc.dll   Main EhSvc.dll Kill all HS ERROR

				bool FirstLog  = true;
				bool SecondLog = false;
		  do{
							DWORD Pointer = *(DWORD*)ADR_ServerPTR;
							if ( Pointer != 0 && FirstLog && !SecondLog )
							{
								   BYTE bpAddEdx         [2]= { 0x03,0xD2 };
								   BYTE bpMovEax         [5]= { 0xB8,0x00,0x00,0x00,0x00 };

									   Tools.BPPatching((void*)(ADR_HSNanoScan1),bpAddEdx,2);    // HS Sub Main Forcing Detection 1 
									   Tools.BPPatching((void*)(ADR_HSNanoScan2),bpMovEax,5);    // HS Sub Call Forcing Detection 2

												  Sleep(5000);

								   BYTE NanoScan1OFF     [2]= { 0x03,0xC2 };
										Tools.BPPatching((void*)(ADR_HSNanoScan1),NanoScan1OFF,2); // Restoring after 5 second inside server

										FirstLog = false;
										SecondLog = true;
							 }
							 if ( Pointer == 0 && SecondLog )
							 {
								 BYTE BTOFFanoScan2   [5] = { 0xE8,0xFE,0x17,0x00,0x00 };        // Restoing if server is == 0

											Tools.BPPatching((void*)(ADR_HSNanoScan2),BTOFFanoScan2,5); 

										FirstLog  = true;
										SecondLog = false;

							 } Sleep(20);
			 }while(TRUE);
	   
	   }else{
									 Tools.AddLog("%s - Error: HackShield module not found!\n",Tools.AddTime());			 
									 ExitProcess(TRUE);                                  
	        }
}
All Credits to King7!
06/29/2012 15:21 antondude#7310
request
dumped wr
06/29/2012 15:27 Fischii26#7311
#Request Addys

#Request Mesagebox

MfG Fischii26
06/29/2012 18:16 [Coder]DreaM'#7312
request quick plant &Defuse source please +addys :)
06/29/2012 19:58 xBioK1ngz#7313
Quote:
Originally Posted by Fischii26 View Post
#Request Addys

#Request Mesagebox

MfG Fischii26
Addys:
[Only registered and activated users can see links. Click Here To Register...]

MessageBox
Was für eine ?
Die normale von Windows, oder die von WarRock ?
06/29/2012 20:02 cheatslaw#7314
i keep lolling at this thread, calling yourself coders and then asking for a pre-made source + addies
how do i say this... LEECHERS haha :)
It amazes me that you guys call yourself coders and please [Coder] DreaM remove that "[Coder]" Before your name untill you got some skills...
06/29/2012 20:28 [Coder]DreaM'#7315
Quote:
Originally Posted by cheatslaw View Post
i keep lolling at this thread, calling yourself coders and then asking for a pre-made source + addies
how do i say this... LEECHERS haha :)
It amazes me that you guys call yourself coders and please [Coder] DreaM remove that "[Coder]" Before your name untill you got some skills...
do not think and show me your not always with the same principles you have something on it. I have my goot the source ergind failt ask what I should not? You can here determine anything and you start as you could you would not just quietly and respecktier other people have diesource value = 999 and addy is right I just do not know is where the error and here I have not determined the I as good code or so therefore let it please. if you do not want to help others then you have no right to seek asylum here because the sammelthread sources is to ask sources

Quote:
Originally Posted by Fischii26 View Post
#Request Addys

#Request Mesagebox

MfG Fischii26
wenn Windows Messagebox dann hier

MessageBoxA(GetActiveWindow(),"[coder]DreaM' >> You Are Using FULL VIP Enjoy it ;)","!",MB_OK);
06/29/2012 20:41 xx120xx#7316
Game MessageBox :


Dumped WR :
[Only registered and activated users can see links. Click Here To Register...]
( VT is ja wohl dabei unnötig . macht einen oder nicht lol xD )
06/29/2012 20:55 +Yazzn#7317
Code:
#ifdef MessageBox
#undef MessageBox
#endif

typedef void (__stdcall* tMessageBox)(int, char*, int, int, char*, int);
tMessageBox MessageBox = (tMessageBox)0x50478E;

MessageBox (*(DWORD*)0xA313F0, "Test", 0, MB_OK, "Name_Message", 0);
06/29/2012 21:00 .BuBBLe#7318
Hackshield Bypass:
Code:
void DetouringHackShield ( void )
{  
	//Scanning for Module
	PDWORD dwHSModule;
	do
	{
		*(DWORD*)&dwHSModule = *(DWORD*)GetModuleHandleA("EhSvc.dll");
	}
	while ( !dwHSModule );

	//Searching Addys...
	DWORD dwHSCallBack1 = Tools.FindPatternRemote((DWORD)dwHSModule,0x11E000,(PBYTE)"\x55\x8B\xEC\x83\xEC\x00\x53\x56\x57\x89\x4D\xE0",ASM);
	DWORD dwHSCallBack2 = Tools.FindPatternRemote((DWORD)dwHSModule,0x11E000,(PBYTE)"\x83\xC4\x00\x85\xDB\x75\x00\x55\xE8\x00\x00\x00\x00\x83\xC4\x00\x33\x00",ASM);    
	DWORD dwHSNanoScan1 = Tools.FindPatternRemote((DWORD)dwHSModule,0x11E000,(PBYTE)"\x8B\x45\x00\x03\xC2\x89\x45\x00\x83\x7D\xDC\x00",ASM);    
	DWORD dwHSNanoScan2 = Tools.FindPatternRemote((DWORD)dwHSModule,0x11E000,(PBYTE)"\x8B\x55\x00\x52\xE8\x00\x00\x00\x00\x83\xC4\x14\x89\x45\x00\x83\x7D\xE4\x00",ASM);
	//Setting up our Bytes...
	BYTE bpJe         [1] = { 0x74 };
    BYTE bpRetnA      [1] = { 0xC3 };
	BYTE bpAddEdx     [2] = { 0x03,0xD2 };
    BYTE bpMovEax     [5] = { 0xB8,0x00,0x00,0x00,0x00 };
	BYTE NanoScan1OFF [2] = { 0x03,0xC2 };
	BYTE BTOFFanoScan2 [5] = { 0xE8,0xFE,0x17,0x00,0x00 }; 
	//Some Other Stuff
	BOOL FirstLog  = TRUE;
    BOOL SecondLog = FALSE;
	//Detouring the Hackshield
	Tools.WriteMemory((void*)(dwHSCallBack2),bpJe,1);    //EhSvc.dll   CRC Check new actualy working
    Tools.WriteMemory((void*)(dwHSCallBack1),bpRetnA,1); //EhSvc.dll   Main EhSvc.dll Kill all HS ERROR

	do
	{
		DWORD S_Pointer = *(DWORD*)0x00A30994;
		if ( S_Pointer != 0 && FirstLog && !SecondLog )
		{
			Tools.WriteMemory((void*)(dwHSNanoScan1),bpAddEdx,2);    // HS Sub Main Forcing Detection 1 
            Tools.WriteMemory((void*)(dwHSNanoScan2),bpMovEax,5);    // HS Sub Call Forcing Detection 2
			Sleep(5000); // Begin of Endless Loop
			Tools.WriteMemory((void*)(dwHSNanoScan1),NanoScan1OFF,2); // Restoring after 5 second inside server
			FirstLog = false;
            SecondLog = true;
		}
		if ( S_Pointer == 0 && SecondLog )
        {
			BYTE BTOFFanoScan2   [5] = { 0xE8,0xFE,0x17,0x00,0x00 };        // Restoing if server is == 0

            Tools.WriteMemory((void*)(dwHSNanoScan2),BTOFFanoScan2,5); 
			FirstLog  = true;
		    SecondLog = false;

        }Sleep(20);
	}while (TRUE);
}
Credits:
PHP Code:
Bypass King7
Restructuring 
BuBBLe 
Have Fun
06/29/2012 21:29 Fischii26#7319
Danke aber ich meinte die MSGBOX die an der seite vom Hack ist... ^^

€ Drawbox oder wie dat moped heißt :D
06/29/2012 22:06 xRoute66x#7320
Quote:
Originally Posted by Fischii26 View Post
Danke aber ich meinte die MSGBOX die an der seite vom Hack ist... ^^

€ Drawbox oder wie dat moped heißt :D
So etwas in der Art?
Das ist eine Creditsbox
Code:
  if (Mtitle[0]) {
DrawTextC((x * 7) + 5, y, RED, Mtitle, pFont1);
CMenu_DrawCronersBox((INT)x * 14 + 42,(INT)y - 3,18,95, pDevice);//Credits-Name Box
DrawTextC((INT)(x * 15) + (35 + 7 * 6) ,(INT) y - 2, GREEN, "Credits", pFont1);	//Text = Credits
       CMenu_DrawCronersBox((INT)x * 14 + 42,(INT)y + 22 ,60 + 1,95, pDevice);//Credits Box
	   DrawTextC((INT)(x * 14) + (37 + 7 * 7) ,(INT) y + 22, GREEN, "Croner", pFont1);//Credits
	   DrawTextC((INT)(x * 14) + (35 + 7 * 7) ,(INT) y + 37, GREEN, "Credits", pFont1);//Credits
	   DrawTextC((INT)(x * 14) + (37 + 7 * 7) ,(INT) y + 52, GREEN, "Credits", pFont1);//Credits
	   DrawTextC((INT)(x * 14) + (37 + 7 * 7) ,(INT) y + 67, GREEN, "Credits", pFont1);//Credits
Credits to Croner & me