[15.08] Combat Arms HackShield Bypass - *fully undetected*

08/16/2012 10:21 CyberVeezy :)#1

Combat Arms HackShield Bypass by xStraquaz, BlackLegend

Code:
BOOL MemoryEdit (VOID *lpMem,VOID *lpSrc,DWORD len)//
{
    DWORD lpflOldProtect, flNewProtect = PAGE_READWRITE;
    unsigned char * pDst = (unsigned char *)lpMem,
    *pSrc = (unsigned char *)lpSrc;
    if (VirtualProtect(lpMem,len,flNewProtect,&lpflOldProtect))
    {
    while(len-- > 0) *pDst++ = *pSrc++;
    return (0);
    }  
    return (1);
}

HRESULT __fastcall CombatArms_Bypass()
{
    DWORD dwEhSvc;
    do
    {
        dwEhSvc = (DWORD)GetModuleHandleA("Ehsvc.dll");
        Sleep(30);
    }
    while (!dwEhSvc);

        MemoryEdit((void *)(dwEhSvc + 0x00737DA), (void *)"\xC3", 1);//HSCallBack1 
        MemoryEdit((void *)(dwEhSvc + 0x0009BC8), (void *)"\x74",1);//HSCallBack2
        MemoryEdit((void *)(dwEhSvc + 0x008FCF8), (void *)"\xD2", 1);//HSNanoScan
        MemoryEdit((void *)(dwEhSvc + 0x0072E3C), (void *)"\xC2\x04\x00",3);//EhsvcSelfCrC
        MemoryEdit((void *)(dwEhSvc + 0x0009B30), (void *)"\xC2\x04\x00",3);//Detection
        

    
        return true;
}
}
Other Bypass Addys
Code:
ADR_HS_CALLBACK1                    0x00737DA
ADR_HS_CALLBACK2                    0x0009BC8
ADR_HS_NANOSCAN                     0x008FCF7
ADR_HS_EHSVCSELFCRC                 0x0072E3C
ADR_HS_DETECTION                    0x0009B30
ADR_HS_NANOCHECK1                   0x00368BE
ADR_HS_NANOCHECK2                   0x0033D5F
ADR_HS_HSANTICRASH                  0x0036934
ADR_HS_ASMDETECRION                 0x0026D6B
ADR_HS_NANOCHECK3                   0x0035DE6
Have fun, and press thanks! (:
08/16/2012 12:34 Lawliet#2
approved
08/16/2012 13:54 3Almog#3
How to bypass it i dont know how
08/16/2012 18:03 GigaByte™#4
Quote:
Originally Posted by 3Almog View Post
How to bypass it i dont know how
:facepalm:
You can start by here:
[Only registered and activated users can see links. Click Here To Register...]
and then move on
08/17/2012 09:10 azimali#5
Quote:
Originally Posted by GigaByte™ View Post
:facepalm:
You can start by here:
[Only registered and activated users can see links. Click Here To Register...]
and then move on
im still confused ... do we have 2 make it?
08/17/2012 11:36 Lawliet#6
you have to compile it ;)
08/17/2012 20:21 i0327#7
does not work i compiled it
08/18/2012 02:45 meak1#8
for people who understand, go make your Searchpatter'N so it would work after any Update D;
08/19/2012 04:22 Destroya555#9
OMG keine sau Die sich nit mit sowas aus Kennt kann des nutzen wieso keine exe oder was auch imma^^ die das halt instalirt^^
08/19/2012 13:34 RezChams#10
Mit der Suchfunktion findest du ein Tutorial zum nutzen des Hacks.

Wieso sollte der Hack Ersteller sich noch mehr arbeit machen, wenn die Leute sich einfach mal was anstrengen sollten, wenn es denn schon alles umsonst ist :rolleyes:?
08/27/2012 17:58 Astr0nautx3#11
Ich versteh nicht was das macht?ôo
08/28/2012 11:52 skadi12#12
Quote:
Originally Posted by GigaByte™ View Post
:facepalm:
You can start by here:
[Only registered and activated users can see links. Click Here To Register...]
and then move on
To me, that's a bit silly wanting someone to learn something that could take him a month if not more a whole new language. I do understand why you would refer him to it though, it's nice to learn how to do it yourself. But in the meantime odds are this will be patched and his time will have been wasted for THIS particular bypass. That will snowball him into learning how to actually find these addresses himself and so forth. Even longer wait. Might as well just tell us ALL or simply do it for us.
09/05/2012 15:00 Armalite#13
Sry kenn mich noch nicht so mit dem hacken hier aus aber was bringt der hack?
09/07/2012 16:43 CyberVeezy :)#14
Quote:
Originally Posted by Armalite View Post
Sry kenn mich noch nicht so mit dem hacken hier aus aber was bringt der hack?
Ein Bypass überspringt einige Bytes im HackShield!
09/07/2012 17:04 xXPhil1993Xx#15
Ich hab nur eine Frage in welchen Process injecte ich die dll?
in den Engine oder In den Hackshield process den ich nicht gefunden habe?