ich habe ein weitres tut gefunden um den gameguar zu umgehen aber ich schätze mal es isn fake trozden werd ich ihn hier posten
1. Unpack neuz.exe
2. (assembly) at the place where neuz.exe jumps to the part where it launches gameguard, simply overjump this. tadaa, no NProtect
3. neuz.exe will close itself (quit) when it figures out that GG isn't running.
find the check for GG and jump to the part in the program where the check jumps to, usually, if GG _IS_ running. tadaa, client thinks it's running while it isn't. directly brings us to:
4. The server knows that GG is NOT running and therefore disconnects you.
Capture the packets sent by GameGuard. (up to you how)
5. make a proxy. i.e. with mIRC Script:
Listen on port 28000 and 5400 (might use other ports as well, just check it )
6. find the IP(s) that FlyFF connect to. easily done with a firewall and/or packet sniffer like ethereal / WPE Pro.
Remember them, they will become important in step 7.
Change these IP's in neuz.exe to 127.0.0.1 (localhost).
neuz.exe now connects to your mIRC proxy.
7. ensure that when neuz.exe connects to mIRC,
mIRC _DIRECTLY_ connects to the IP that neuz.exe connected to, before.
8. You now can inject the data that GameGuard sends.
Once this is done, flyff can connect to the server again, WITHOUT having NProtect running.
If you got to THIS point, you are holding a very powerfull tool package in your hands.
You should now be able to build injection plugins for the mIRC that you just missused to be a proxy.
-> Speed-Skill, Teleport, Spam (or flood), PK Hack, Highspeed dropping of penya / items at any place (remember penya cubes), maybe also Duping, ...
~~See FlyFF is hackable and penya (dupe) hacks exist i done this once.
1. Unpack neuz.exe
2. (assembly) at the place where neuz.exe jumps to the part where it launches gameguard, simply overjump this. tadaa, no NProtect
3. neuz.exe will close itself (quit) when it figures out that GG isn't running.
find the check for GG and jump to the part in the program where the check jumps to, usually, if GG _IS_ running. tadaa, client thinks it's running while it isn't. directly brings us to:
4. The server knows that GG is NOT running and therefore disconnects you.
Capture the packets sent by GameGuard. (up to you how)
5. make a proxy. i.e. with mIRC Script:
Listen on port 28000 and 5400 (might use other ports as well, just check it )
6. find the IP(s) that FlyFF connect to. easily done with a firewall and/or packet sniffer like ethereal / WPE Pro.
Remember them, they will become important in step 7.
Change these IP's in neuz.exe to 127.0.0.1 (localhost).
neuz.exe now connects to your mIRC proxy.
7. ensure that when neuz.exe connects to mIRC,
mIRC _DIRECTLY_ connects to the IP that neuz.exe connected to, before.
8. You now can inject the data that GameGuard sends.
Once this is done, flyff can connect to the server again, WITHOUT having NProtect running.
If you got to THIS point, you are holding a very powerfull tool package in your hands.
You should now be able to build injection plugins for the mIRC that you just missused to be a proxy.
-> Speed-Skill, Teleport, Spam (or flood), PK Hack, Highspeed dropping of penya / items at any place (remember penya cubes), maybe also Duping, ...
~~See FlyFF is hackable and penya (dupe) hacks exist i done this once.