Quote:
Originally Posted by DeathByMoogles
Really? I actually find that quite surprising. I assumed it had to be a proxy because I have never encountered a memory-based bot that was able to attack as fast as SirHooks. Did it store the monsters' coordinates in some kind of array and then iterate through it? Always was curious about the secret to its speed...
|
Just because it's memory based doesn't mean it's more limited.
Hook based bots do everything proxies do without having to fiddle with encryption at all. I'd actually suggest hooking the send/receive function of the client and tada! You have a fully working packet sniffer which can then be used to spoof packets to the client or to the server (exactly what a proxy does)
You can also read or control the client through extra hooks but they are all optional and for simplicity sake and not actually required.
I suggest looking at the existing frameworks as a guideline of how bots CAN work but there's no reason to not go with a hook based approach.
Quote:
Originally Posted by nicolastyler
Assembly is not required, although it can be useful. and you don't need to know c++ and C#, just one is good enough. They can both do the job.
|
Without a decent knowledge of assembly how are you going to reverse engineer anything? Olly is useful for breakpointing and tracking down things but you still need to know what you're looking at if you want to re-write it or reverse engineer it.
This is even more important if you want to move towards a proxy based approach where you'll be required to reverse engineer much of the clients protection as well as cryptography.