|
You last visited: Today at 13:44
Advertisement
SendPacket C++
Discussion on SendPacket C++ within the C/C++ forum part of the Coders Den category.
09/20/2022, 18:02
|
#1
|
elite*gold: 0
Join Date: Dec 2008
Posts: 5
Received Thanks: 2
|
SendPacket C++
Hollo,
I try to edit and sendpacket for use skill or walk on my exe game.
As picture, i set breakpoint on 00787FA3 it triggered when i use skill or walk only.
Walk packet is 5F 03 0B CE D0
How can I edit packet in 00191F7C and send to exe game with C++, please show me for example code or have other method?
Thanks.
|
|
|
09/30/2022, 14:45
|
#2
|
elite*gold: 1
Join Date: Apr 2010
Posts: 13,772
Received Thanks: 15,036
|
Is the packet buffer passed to 008F9CA0 in ECX? If yes you can easily call it by injecting your own DLL.
|
|
|
09/30/2022, 18:38
|
#3
|
elite*gold: 0
Join Date: Dec 2008
Posts: 5
Received Thanks: 2
|
Quote:
Originally Posted by Omdi
Is the packet buffer passed to 008F9CA0 in ECX? If yes you can easily call it by injecting your own DLL.
|
Thank you for your response.
The packet buffer address is 00191F7C (Correct me if I'm wrong)
I think packet buffer passed to 008FA0A0 in EAX (as Picture 01). Can i use this function?
Picture 01 (set Breakpoint at 00787F8F)
Picture 02 (set Breakpoint at 00787F96)
Picture 03 (set Breakpoint at 00787F9C)
Picture 04 (set Breakpoint at 00787FA3)
|
|
|
09/30/2022, 19:41
|
#4
|
elite*gold: 1
Join Date: Apr 2010
Posts: 13,772
Received Thanks: 15,036
|
Quote:
Originally Posted by krangsak
Thank you for your response.
The packet buffer address is 00191F7C (Correct me if I'm wrong)
I think packet buffer passed to 008FA0A0 in EAX (as Picture 01). Can i use this function?
Picture 01 (set Breakpoint at 00787F8F)
Picture 02 (set Breakpoint at 00787F96)
Picture 03 (set Breakpoint at 00787F9C)
Picture 04 (set Breakpoint at 00787FA3)

|
Could you upload the binary, so I could take a quick look?
|
|
|
09/30/2022, 20:08
|
#5
|
elite*gold: 0
Join Date: Dec 2008
Posts: 5
Received Thanks: 2
|
Quote:
Originally Posted by Omdi
Could you upload the binary, so I could take a quick look?
|
Sorry, I don't understand you. Do you mean upload EXE file or use binary copy menu in Ollydbg?
This my EXE and file dll for debug.
I'm try to make like this
Additional picture
PIC-ADD-01
PIC-ADD-02
PIC-ADD-03
PIC-ADD-04
|
|
|
10/01/2022, 20:53
|
#6
|
elite*gold: 0
Join Date: Dec 2008
Posts: 5
Received Thanks: 2
|
Now. i think I found it.
Arg1 = 2E >> is Movement X
Arg2 = EC >> is Movement Y
Can someone guide me for hook code?
|
|
|
10/08/2022, 16:30
|
#7
|
elite*gold: 0
Join Date: Dec 2008
Posts: 5
Received Thanks: 2
|
Code:
CPU Disasm
Address Hex dump Command Comments
00785173 |.^\E9 6EABFFFF JMP 0077FCE6
00785178 |> B8 37040000 MOV EAX,437
0078517D |. 8895 5604FFFF MOV BYTE PTR SS:[EBP+FFFF0456],DL
00785183 |. 66:8985 5004F MOV WORD PTR SS:[EBP+FFFF0450],AX
0078518A |. 8D85 5004FFFF LEA EAX,[EBP+FFFF0450]
00785190 |. 50 PUSH EAX
00785191 |. 898D 5204FFFF MOV DWORD PTR SS:[EBP+FFFF0452],ECX
00785197 |. 68 37040000 PUSH 437
0078519C \. E9 EE2D0000 JMP 00787F8F
007851A1 /> 8BCF MOV ECX,EDI
007851A3 |. E8 787FFFFF CALL 0077D120 ; [Ragnarok.0077D120
007851A8 |. 3C 01 CMP AL,1
007851AA |.^ 0F84 8CACFFFF JE 0077FE3C
007851B0 8B8D 4C06FFFF MOV ECX,DWORD PTR SS:[EBP+FFFF064C] ; //MovementX
007851B6 B8 5F030000 MOV EAX,35F
007851BB 8B95 4806FFFF MOV EDX,DWORD PTR SS:[EBP+FFFF0648] ; //MovementY
007851C1 |. 66:8985 4C2BF MOV WORD PTR SS:[EBP+FFFF2B4C],AX
007851C8 |. 8BC1 MOV EAX,ECX
007851CA |. C1F8 02 SAR EAX,2
007851CD |. 8885 4E2BFFFF MOV BYTE PTR SS:[EBP+FFFF2B4E],AL
007851D3 |. 8BC2 MOV EAX,EDX
007851D5 |. C1F8 04 SAR EAX,4
007851D8 |. 24 3F AND AL,3F
007851DA |. C0E1 06 SHL CL,6
007851DD |. 0AC1 OR AL,CL
007851DF |. C0E2 04 SHL DL,4
007851E2 |. 8885 4F2BFFFF MOV BYTE PTR SS:[EBP+FFFF2B4F],AL
007851E8 |. 8D85 4C2BFFFF LEA EAX,[EBP+FFFF2B4C]
007851EE |. 50 PUSH EAX
007851EF |. 8895 502BFFFF MOV BYTE PTR SS:[EBP+FFFF2B50],DL
007851F5 |. 68 5F030000 PUSH 35F
007851FA \. E9 902D0000 JMP 00787F8F
007851FF /> 8B95 4C06FFFF MOV EDX,DWORD PTR SS:[EBP+FFFF064C]
Code:
CPU Disasm
Address Hex dump Command Comments
00787F71 |. /7C 02 JL SHORT 00787F75
00787F73 |> |33C0 XOR EAX,EAX
00787F75 |> \8985 D203FFFF MOV DWORD PTR SS:[EBP+FFFF03D2],EAX
00787F7B |. B9 6D0B0000 MOV ECX,0B6D
00787F80 |. 8D85 D003FFFF LEA EAX,[EBP+FFFF03D0]
00787F86 |. 66:898D D003F MOV WORD PTR SS:[EBP+FFFF03D0],CX
00787F8D |. 50 PUSH EAX
00787F8E |. 51 PUSH ECX
00787F8F |> E8 2CCCB45F CALL Hooks::Send_Packet_Hook_P2
00787F94 |. 8BC8 MOV ECX,EAX
00787F96 |. E8 25171700 CALL 008F96C0 ; \Ragnarok.008F96C0
00787F9B |. 50 PUSH EAX
00787F9C |> E8 FF201700 CALL 008FA0A0
00787FA1 |. 8BC8 MOV ECX,EAX
00787FA3 |. E8 F81C1700 CALL 008F9CA0 ; \Ragnarok.008F9CA0
00787FA8 |. 33C0 XOR EAX,EAX
00787FAA \. EB 13 JMP SHORT 00787FBF
00787FAC /> 8B95 4C06FFFF MOV EDX,DWORD PTR SS:[EBP+FFFF064C]
Code:
Naked void Hooks::Send_Packet_Hook_P2(void) //00787F8F
{
__asm
{
POP Outgoing_Packet_Return_Address
//PUSHAD
MOV ECX, 0x2A //Movement X
MOV EAX, 0x35F
MOV EDX, 0x0EB //Movement Y
MOV WORD PTR SS : [EBP + 0xFFFF2B4C] , AX
MOV EAX, ECX
SAR EAX, 0x2
MOV BYTE PTR SS : [EBP + 0xFFFF2B4E] , AL
MOV EAX, EDX
SAR EAX, 0x4
AND AL, 0x3F
SHL CL, 0x6
OR AL, CL
SHL DL, 0x4
MOV BYTE PTR SS : [EBP + 0xFFFF2B4F] , AL
LEA EAX, [EBP + 0xFFFF2B4C]
PUSH EAX
MOV BYTE PTR SS : [EBP + 0xFFFF2B50] , DL
PUSH 0x35F
//POPAD
CALL Properties::Send_Packet_Original_Address
PUSH Outgoing_Packet_Return_Address
RET
}
}
|
|
|
 |
Similar Threads
|
SendPacket
03/30/2018 - GW Exploits, Hacks, Bots, Tools & Macros - 1 Replies
ich will mein Bot updaten wie finde ich die Neuen Mems heraus?
würde mich um eine vernüftige antwort freuen.
|
How To Find SendPacket Address with olly or other method?
08/05/2014 - PW Hacks, Bots, Cheats, Exploits - 0 Replies
Please help me with finding send packet address
|
Detouring SendPacket
03/27/2013 - PW Hacks, Bots, Cheats, Exploits - 10 Replies
Hello there.
I'm posting about my problem since I haven't found any thread about this topic :(
I am trying to make an 'outgoing packet listener' for this game, by detour-ing its SendPacket function. Obviously it only listens for packets being sent.
I want to avoid using MS Detours, so I'm using a detour function I found on the internet.
Needless to say I am injecting a dll into the client in order to do that.
The problem is the game crashes, most likely when jumping from my custom...
|
[Question again, sorry] is this bot with SendPacket data parser?
09/14/2012 - Cabal Online - 3 Replies
Hello there, Ladies and Gentlemen :)
Sorry, noob here and need some direction!! :D
PSCBots use SendPacket for bot? it's works without Gameguard ByPass?
your help is greatly appreciated :handsdown:
Thank you ^_^
~Credits~ (Click their name to thank them!)
PSCBots : nice auto bot
|
C->S SendPacket Frage
09/13/2010 - Last Chaos - 0 Replies
hey, hab die sendpacket funktion ( bevor das packet encrypted wird ) gehooked, klappt auch ganz gut
http://s1.directupload.net/images/100913/422dsl63 .png
nur scheint die sendpacket funktion ziehmlich behindert aufgebaut zu sein ( wie der rest von last chaos.. ).
wäre nett wenn jemand nen prototyp der funktion posten könnte, dann würde mir eine menge arbeit erspart bleiben ;)
danke
|
All times are GMT +1. The time now is 13:44.
|
|