How to bypass my conquer client to redirect it on my localhost and specific port that i will define other than 9959, 9960 and 5816.
I know how to redirect it using the example on this site but but it never change the ports being used in co client
P.S:i know conquer loader available on the epvp but its detectable by co antibot so i want a sample code to add it to my own program
i got this code from someone here on forums it can easily bypass the ip ... but i also WANT TO bypass port ... can anyone give sample code for it?
code:
public static int connect(uint PID, string IPAdd)
{
IntPtr ws2Handle = native.LoadLibrary("WS2_32.dll");
if (ws2Handle == null)
{
native.FreeLibrary(ws2Handle);
return 1;
}
IntPtr cHandle = native.OpenProcess(enumProcessAccessFlags.VMOperat ion | enumProcessAccessFlags.VMRead | enumProcessAccessFlags.VMWrite | enumProcessAccessFlags.All, true, PID);
if (cHandle == null)
{
native.FreeLibrary(ws2Handle);
return 2;
}
IntPtr inet_addr = native.GetProcAddress(native.GetModuleHandle("WS2_ 32.dll"), "inet_addr");
if (inet_addr == null)
{
native.FreeLibrary(ws2Handle);
return 3;
}
byte[] buffer = { 0xb8, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x4, 0x0, 0x90, 0x90 };
byte[] byteIPaddress = IPAddress.Parse(IPAdd).GetAddressBytes();
System.Buffer.BlockCopy(byteIPaddress, 0, buffer, 1, byteIPaddress.Length);
//Get the original value
if (firstflg)
{
int bytesRead = 0;
native.ReadProcessMemory(cHandle, inet_addr, bufferread, (uint)bufferread.Length, out bytesRead);
firstflg = false;
}
int bytesWritten = 0;
if (!native.WriteProcessMemory(cHandle, inet_addr, buffer, (uint)buffer.Length, out bytesWritten))
{
native.FreeLibrary(ws2Handle);
return 4;
}
native.CloseHandle(cHandle);
native.FreeLibrary(ws2Handle);
return 0;
}






function, not the 