- Open Conquer.exe with Ollydbg
- Right click on the main CPU thread > Search for all intermodular calls
- Search for "WS32_32.inet_adress" (there are three of them)
- Double click on one of them, and under two instructions you'll find something like
Code:
00432C57 |. FF15 84575200 CALL DWORD PTR DS:[<&WS2_32.#11>] ; \inet_addr
00432C5D |. 83F8 FF CMP EAX,-1
00432C60 |. 74 08 JE SHORT Conquer.00432C6A
- Below the JE SHORT is an instruction
Code:
004E405A . 3C 7F CMP AL,7F
- Right click > Binary > NOP
- You can just NOP just two of inet_adress not all three (I'd recommend to NOP the first two)
- Right click > Copy to executable > All selection
- Save your file (be sure to make a backup before)
Now you have a Conquer.exe that bypasses the Server.dat check.