for i<-0 to infiniteQuote:
5609 Addresses:
SendPacketFunction = 0x6C8F56
ReceiveLoop = 0x6C9833
This is how I find the addresses:
Recv Loop
1. Search all referenced text strings for "catch error in process msg" without quotes.
2. Trace back until I find "TEST EAX, EAX" followed by "JNZ SHORT <ADDRESS>".
Send Packet Function
1. Search for the binary string "55 8D AC 24 FC DF FF FF B8 04 20 00 00".
Removing the "You can't jump that far." message
1. Search for the constant 186C0.
2. Trace back to the first "JLE <ADDRESS>" command.
3. Replace JLE (7E) with JMP (EB).
*Note: doing this also means that you can attempt to jump further than the server allows (which will disconnect you) so you should validate all jump packets from the client.
Lock client at 60 FPs
1. Search all intermodular calls for Kernel32.Sleep.
2. Trace back and find ADD ECX, 19.
3. Trace back and find LEA EDX, DWORD PTR DS:[ECX+19].
4. Change 19 to another value. The lower the value the higher the FPS and the reverse is true. I use a value of 10 for 60 FPS.
Yes it's very rudimentary as I am as much a noob at this as anyone.
[Only registered and activated users can see links. Click Here To Register...]Quote:
@hawtness
I was trying to add some functionality to the TestBot, then i realized that the magic type interact packet has had its targetID and Position encrypted
current packet structure appears to be
[length][packet type] [time stamp] [char id] [target id] [position] [interact type] [some unknown data field that only exists in magic type interact packets]
can you disclose the details of the current interact packet?
[Only registered and activated users can see links. Click Here To Register...]Quote:
can ou gmme link pls