//
That is the guide i followed... oh well maybe i missed something gonna try againQuote:
Here's a little guide to do it with OllyDbg.
-Attach the process and put the Conquer module into the CPU window
-Right click and search for->All intermodular calls.
-Find ws2_32.inet_addr in the list. Might be a pain, sort alphabetically and look under 'i'.
-For each instance of inet_addr, double click to load it into the CPU window. Under each a few instructions down, you should see CMP AL, 7F or an instruction like it, which is checking the IP returned by inet_addr isn't localhost.
-Assemble the instruction and change it to NOP. Make sure "Fill with NOPs is checked".
-When done, right click on the CPU window again, and Copy to Executable->All changes
-In the new hex view of the executable that pops up, right click and save file.
Simple as.
I re-read your post and i thought screw the intermodular step lolQuote:
Here's a little guide to do it with OllyDbg.
-Attach the process and put the Conquer module into the CPU window
-Right click and search for->All intermodular calls.
-Find ws2_32.inet_addr in the list. Might be a pain, sort alphabetically and look under 'i'.
-For each instance of inet_addr, double click to load it into the CPU window. Under each a few instructions down, you should see CMP AL, 7F or an instruction like it, which is checking the IP returned by inet_addr isn't localhost.
-Assemble the instruction and change it to NOP. Make sure "Fill with NOPs is checked".
-When done, right click on the CPU window again, and Copy to Executable->All changes
-In the new hex view of the executable that pops up, right click and save file.
Simple as.