[HELP]Gawron25's Auto Loot Script

01/30/2013 07:04 iCraziE#1
So here is gawron25's script.
Code:
[ENABLE]
alloc(blah,2024)
alloc(blah3,2024)
label(blah2)

005CF0CE: // CMP EAX,5020000 // <--Need to be updated
JMP blah

blah:
MOV BX,WORD PTR DS:[EDI+1C]
CMP BX,26AE //Gold Argate
JE blah2
CMP BX,26AD //Copper Argate
JE blah2
CMP BX,26AF //Silver Argate
JE blah2
MOV BX,1
MOV AX,1
POP EDI
POP ESI
RETN 4

blah2:

MOV BX,WORD PTR DS:[EDI+10]
MOV EAX,blah3
MOV DWORD PTR DS:[EAX],E7395B84
MOV DWORD PTR DS:[EAX+4],180000
MOV DWORD PTR DS:[EAX+8],0
MOV DWORD PTR DS:[EAX+C],5020003
MOV WORD PTR DS:[EAX+10],BX
MOV WORD PTR DS:[EAX+12],1000
MOV DWORD PTR DS:[EAX+14],1
mov ecx,[00C7AB98] // <--Need to be updated
MOV BX,1
PUSH EAX
CALL 00562BF0  // <--Need to be updated
MOV AX,1
POP EDI
POP ESI
RETN 4

[DISABLE]
dealloc(blah)

005CF0CE: // <--Need to be updated
POP EDI
POP ESI
RETN 4
I've searched and found three offsets already (for 005CF0CE) ::

Code:
008B638B
0091470E
00914E6D
I just need help updating the rest of it. Could anyone help?

BTW :: I am trying to do this on a private server.
02/01/2013 04:15 Killerhunta123#2
what private server is it on
02/02/2013 19:50 Naniooooo#3
search for the code and look how many address will pop out
and test all
08/23/2018 08:18 Spazman6117#4
Yes I know this is an old script but......

Naniooooo, I know you still around here so do you mind please answering a simple question.

What do the other 2 offsets do in this script and what do I search for to update them??
08/23/2018 10:35 guesswho-.-#5
iirc the first offset is the base of the winsock class and the second one is calling the packet construct and/or send call.
08/23/2018 11:30 Spazman6117#6
Quote:
Originally Posted by guesswho-.- View Post
iirc the first offset is the base of the winsock class and the second one is calling the packet construct and/or send call.
And is there any assembly code I can search for that will update these 2 offsets? or array of bytes if possible too

I've already got the first offset updated
08/23/2018 14:16 guesswho-.-#7
Search for pretty much any packet :p
Every packet constructor looks the same so you could even eyeball it.


I'm not sure if the registers are right, at some point it changed but you'd have to track down the pickup packet to find out.
08/24/2018 09:39 Spazman6117#8
Ah ok, cheers man for the help. I know how to retrieve the packets but not 100% sure how to turn packets into an offset ^^ or would the packet say what offset it is activating in the dekaron.exe?