attack vid

12/14/2016 12:23 kriskag#1
[Only registered and activated users can see links. Click Here To Register...]
Here is an attack on the vid who works without a problem while here
[Only registered and activated users can see links. Click Here To Register...]
no longer work that is invoked attack but nothing happens maybe someone knows something and can help?
12/14/2016 13:24 .Verkauf´#2
Check whats inside the function, alot of servers check for foreign injected threads etc.. also check which parameters are passed to the function
12/14/2016 15:44 _asm#3
simply grab the class object pointer of this instance and if necessary, defeat ASLR or find a way to get the relative address of the class instance pointer.
after you've done that, you can simply write yourself a function pointer with its required calling convention which you can also easily find out with some basic reversing skills

EDIT: the class object (this pointer) is probably initialized in some prior instruction which might be in "call 0x004ad760" where the 'this' pointer is stored in the register EAX.
12/16/2016 00:15 kriskag#4
thank you so much already and I found a way all addresses
12/17/2016 15:31 kriskag#5
[Only registered and activated users can see links. Click Here To Register...]
why ? not work please help mi.
12/17/2016 18:24 _asm#6
Seriously, what the fuck are you trying to accomplish???
Just use a simple Function-Pointer to SendBattleAttackPacket and grab the CNetworkStream Object pointer from the EAX register that is most likely stored in the call at the address 0x004ad760.

I assume you just copied some embedded python code and assembled everything in a horrible mess together while crossing your fingers and hoping that it magically works.
that's not how programming, and most importantly, reverse engineering works.
Learn the basics of assembler, especially x86 assembler since most games here in this forum are compiled for x86 machines and please make sure to have some decent knowledge of c/c++ before trying to dig into reverse engineering or something related.
12/17/2016 19:39 kriskag#7
up insulted me may not know much about assembler why ask me wszysko both genders can I

give you a video base address I have wszysko is biking how are you do not know that I

do not condemn because it alone I've done here, you proof video I was just asking how

variable int give to mov ecx, DWORD PTR DS: [0x00718fc4] because the base address only

know how Żminne gives [here] is not working I wszysko genders great only when someone

exercises this .pyd and functions that I did not zadzila him because I do not know how

to add a base there address [base address + cos there]
[Only registered and activated users can see links. Click Here To Register...]
12/17/2016 21:21 _asm#8
And now in English.