Hi guys, today i have a question and not a release, eheh !
I'm not very good in reverse engineering but i want learn it..
I chose a random packet ( c_skill, it's simple & fast ) and now i want try to write a function that send the packets to server ( dll with gui )
..I haven't problems to make the dll, so easy..
Then i got this with ollydbg:
I tryed with:
But the client crash when i click on the button, it's doesn't work..
So i thought i'd had to add this:
Then i written this:
But i get the same problem..
Somebody, that know how to reverse, can help me ? thanks, i waiting answers..
I'm not very good in reverse engineering but i want learn it..
I chose a random packet ( c_skill, it's simple & fast ) and now i want try to write a function that send the packets to server ( dll with gui )
..I haven't problems to make the dll, so easy..
Then i got this with ollydbg:
Code:
0061908B A1 A0B06600 MOV EAX,DWORD PTR DS:[66B0A0] 00619090 8B00 MOV EAX,DWORD PTR DS:[EAX] 00619092 BA F4926100 MOV EDX,nostalex.006192F4 ; ASCII "c_skill" 00619097 E8 F85BF0FF CALL nostalex.0051EC94 0061909C E9 32010000 JMP nostalex.006191D3 006190A1 A1 F8BF6600 MOV EAX,DWORD PTR DS:[66BFF8] 006190A6 8B00 MOV EAX,DWORD PTR DS:[EAX] 006190A8 8B40 40 MOV EAX,DWORD PTR DS:[EAX+40]
Code:
char *packet = "c_skill";
DWORD send_addr = 0x0051EC94;
_asm
{
MOV EDX, packet
CALL send_addr
}
So i thought i'd had to add this:
Code:
0061908B A1 A0B06600 MOV EAX,DWORD PTR DS:[66B0A0] 00619090 8B00 MOV EAX,DWORD PTR DS:[EAX]
Code:
char *packet = "c_skill";
DWORD send_addr = 0x0051EC94, send_eax = 0x0066B0A0;
_asm
{
MOV EAX, DWORD PTR DS:[send_eax]
MOV EAX, DWORD PTR DS:[EAX]
MOV EDX, packet
CALL send_addr
}
Somebody, that know how to reverse, can help me ? thanks, i waiting answers..