I saw so much questions to this, i can't stand it anymore.
Heres the full tutorial.
and remember, pixelbots are crap.
note:
the server SENDS you EVERYTHING you need to know!
it sends when a monster spawns, where it spawns, if somebody fights with it, if a monster is red (automatically going to attack you) or yellow (not going to attack you automatically), what monster it is etc etc.
i think packet manipulation works way more precise.
i am not going into the details, i didnt do this on my own. but it makes very much sense, it should work.
do not send me any questions in any way on how exactly anything of the following points would work.
1. Unpack neuz.exe
2. (assembly) at the place where neuz.exe jumps to the part where it launches gameguard, simply overjump this. tadaa, no NProtect
3. neuz.exe will close itself (quit) when it figures out that GG isn't running.
find the check for GG and jump to the part in the program where the check jumps to, usually, if GG _IS_ running. tadaa, client thinks it's running while it isn't. directly brings us to:
4. The server knows that GG is NOT running and therefore disconnects you.
Capture the packets sent by GameGuard. (up to you how. i dont answer questions on this)
5. make a proxy. i.e. with mIRC Script:
Listen on port 28000 and 5400 (might use other ports as well, just check it :p)
6. find the IP(s) that FlyFF connect to. easily done with a firewall and/or packet sniffer like ethereal / WPE Pro.
Remember them, they will become important in step 7.
Change these IP's in neuz.exe to 127.0.0.1 (localhost).
neuz.exe now connects to your mIRC proxy.
7. ensure that when neuz.exe connects to mIRC,
mIRC _DIRECTLY_ connects to the IP that neuz.exe connected to, before.
8. You now can inject the data that GameGuard sends.
remember to also not ask me about the encrypting / decrypting.
Once this is done, flyff can connect to the server again, WITHOUT having NProtect running.
If you got to THIS point, you are holding a very powerfull tool package in your hands.
You should now be able to build injection plugins for the mIRC that you just missused to be a proxy.
-> Speed-Skill, Teleport, Spam (or flood), PK Hack, Highspeed dropping of penya / items at any place (remember penya cubes), maybe also Duping, ...
You also could log all the data sent, and, depending on your coding/scripting skills, making an OWN Server!
Latest notes:
1. remember to not execute flyff.exe! it's the evil updater which would overwrite your neuz.exe
also you should give the new exe a new name to ensure this never happens. i.e. proxyneuz.exe
2. it doesnt run without having the updater started before? no problem!
there are 2 ways to go arround this. an easy one and a harder one.
easy: make a batch file.
3. The version of flyff i am using doesn't allow windowmode. what to do?
edit the file 'sunkist.ini'
add 2 new rows, i.e. near to your ID in the ini file.
4. This all sounds easy except capturing GG packets while it's running.
-> you can eighter rootkit the sniffer to hide it from GG or use a second computer to capture the packets being sent through the ethernet bridge.
...but if you use a second computer, you could also try to just use WPE Pro to manipulate the data. this should even work with having GG running on the other PC...
5. where do i get the tool (whatever) ?
-> google it. google is a -very easy to use- search engine.
if google.com doesn't help, you might want to try... search engine (using yahoo's databases)
6. this tutorial should apply for alot of other games using TCP as well.
UDP is a bit harder.
Heres the full tutorial.
and remember, pixelbots are crap.
note:
the server SENDS you EVERYTHING you need to know!
it sends when a monster spawns, where it spawns, if somebody fights with it, if a monster is red (automatically going to attack you) or yellow (not going to attack you automatically), what monster it is etc etc.
i think packet manipulation works way more precise.
i am not going into the details, i didnt do this on my own. but it makes very much sense, it should work.
do not send me any questions in any way on how exactly anything of the following points would work.
1. Unpack neuz.exe
2. (assembly) at the place where neuz.exe jumps to the part where it launches gameguard, simply overjump this. tadaa, no NProtect
3. neuz.exe will close itself (quit) when it figures out that GG isn't running.
find the check for GG and jump to the part in the program where the check jumps to, usually, if GG _IS_ running. tadaa, client thinks it's running while it isn't. directly brings us to:
4. The server knows that GG is NOT running and therefore disconnects you.
Capture the packets sent by GameGuard. (up to you how. i dont answer questions on this)
5. make a proxy. i.e. with mIRC Script:
Listen on port 28000 and 5400 (might use other ports as well, just check it :p)
6. find the IP(s) that FlyFF connect to. easily done with a firewall and/or packet sniffer like ethereal / WPE Pro.
Remember them, they will become important in step 7.
Change these IP's in neuz.exe to 127.0.0.1 (localhost).
neuz.exe now connects to your mIRC proxy.
7. ensure that when neuz.exe connects to mIRC,
mIRC _DIRECTLY_ connects to the IP that neuz.exe connected to, before.
8. You now can inject the data that GameGuard sends.
remember to also not ask me about the encrypting / decrypting.
Once this is done, flyff can connect to the server again, WITHOUT having NProtect running.
If you got to THIS point, you are holding a very powerfull tool package in your hands.
You should now be able to build injection plugins for the mIRC that you just missused to be a proxy.
-> Speed-Skill, Teleport, Spam (or flood), PK Hack, Highspeed dropping of penya / items at any place (remember penya cubes), maybe also Duping, ...
You also could log all the data sent, and, depending on your coding/scripting skills, making an OWN Server!
Latest notes:
1. remember to not execute flyff.exe! it's the evil updater which would overwrite your neuz.exe
also you should give the new exe a new name to ensure this never happens. i.e. proxyneuz.exe
2. it doesnt run without having the updater started before? no problem!
there are 2 ways to go arround this. an easy one and a harder one.
easy: make a batch file.
bit harder: (assembly) remove the check for this parameter being sent directly in your proxyflyff.exeQuote:
@echo off
proxyflyff.exe sunkist
3. The version of flyff i am using doesn't allow windowmode. what to do?
edit the file 'sunkist.ini'
add 2 new rows, i.e. near to your ID in the ini file.
(Dev 1 allows to enter full servers, sunkist 1 allows to 'alt + enter' and 'alt + tab' the game. usefull to control your proxy without hotkeys.)Quote:
sunkist 1
Dev 1
4. This all sounds easy except capturing GG packets while it's running.
-> you can eighter rootkit the sniffer to hide it from GG or use a second computer to capture the packets being sent through the ethernet bridge.
...but if you use a second computer, you could also try to just use WPE Pro to manipulate the data. this should even work with having GG running on the other PC...
5. where do i get the tool (whatever) ?
-> google it. google is a -very easy to use- search engine.
if google.com doesn't help, you might want to try... search engine (using yahoo's databases)
6. this tutorial should apply for alot of other games using TCP as well.
UDP is a bit harder.