I fixed fishing for aloken on =Seph= and Hellspiders exe.
REMEMBER THIS TUTORIAL IS ONLY FOR Hellspiders exe.
These executables are a further modification of the ones released by =Seph= (Aloken) and HellSpider (Action Raised Limit Executables).
I use OllyDbg 110, and CFF Explorer to add more space.
Tutorial how I add space:







Here you can see what numbers your new section is between:

Lets start with server.exe :
First you need to find the correct line, simple click "Ctrl + G" write "00475722".
Code:
00475722 > 68 88B66000 PUSH 0060B688 ; ASCII "SEGNALLE" 00475727 . 8D5424 08 LEA EDX,DWORD PTR SS:[ESP+8] 0047572B . 68 F8B66000 PUSH 0060B6F8 ; ASCII "%s" 00475730 . 52 PUSH EDX 00475731 . E8 AAC2F8FF CALL 004019E0 00475736 . 83C4 0C ADD ESP,0C 00475739 . 8D4424 04 LEA EAX,DWORD PTR SS:[ESP+4] 0047573D . 50 PUSH EAX 0047573E . 8BCE MOV ECX,ESI 00475740 . E8 1BC4F8FF CALL 00401B60 00475745 . 84C0 TEST AL,AL 00475747 . 74 0C JE SHORT 00475755 00475749 . B0 04 MOV AL,4 0047574B . 5E POP ESI 0047574C . 81C4 00010000 ADD ESP,100 00475752 . C2 0400 RETN 4 ADD: 00475755 >-E9 924A7700 JMP 00A93000 INSTEAD OF: 00475755 68 94B66000 PUSH 0060B694 ; ASCII "WARRIOR" KEEP REST OF THE CODE: 0047575A . 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8] 0047575E . E8 BDC2F8FF CALL 00401A20 00475763 . 50 PUSH EAX 00475764 . 8BCE MOV ECX,ESI 00475766 . E8 F5C3F8FF CALL 00401B60 0047576B . 84C0 TEST AL,AL 0047576D . 74 0C JE SHORT 0047577B 0047576F . B0 05 MOV AL,5 00475771 . 5E POP ESI 00475772 . 81C4 00010000 ADD ESP,100 00475778 . C2 0400 RETN 4 0047577B > 56 PUSH ESI 0047577C . 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8]
Go to the new space, simple click "Ctrl + G" and write "00A93000"
Add this in new section created by CFF Explorer(Server.exe):
Code:
00A93000 68 94B66000 PUSH 0060B694 ; ASCII "WARRIOR" 00A93005 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8] 00A93009 E8 12EA96FF CALL 00401A20 00A9300E 50 PUSH EAX 00A9300F 8BCE MOV ECX,ESI 00A93011 E8 4AEB96FF CALL 00401B60 00A93016 84C0 TEST AL,AL 00A93018 74 0C JE SHORT 00A93026 00A9301A B0 05 MOV AL,5 00A9301C 5E POP ESI 00A9301D 81C4 00010000 ADD ESP,100 00A93023 C2 0400 RETN 4 00A93026 68 5530A900 PUSH 00A93055 ; ASCII "ALLOKEN" 00A9302B 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8] 00A9302F E8 ECE996FF CALL 00401A20 00A93034 50 PUSH EAX 00A93035 8BCE MOV ECX,ESI 00A93037 E8 24EB96FF CALL 00401B60 00A9303C 84C0 TEST AL,AL 00A9303E 74 0C JE SHORT 00A9304C 00A93040 B0 06 MOV AL,6 00A93042 5E POP ESI 00A93043 81C4 00010000 ADD ESP,100 00A93049 C2 0400 RETN 4 00A9304C -E9 2A279EFF JMP 0047577B 00A93051 0000 ADD BYTE PTR DS:[EAX],AL 00A93053 0000 ADD BYTE PTR DS:[EAX],AL 00A93055 41 INC ECX 00A93056 4C DEC ESP 00A93057 4C DEC ESP 00A93058 4F DEC EDI 00A93059 4B DEC EBX 00A9305A 45 INC EBP 00A9305B 4E DEC ESI
Time to setup our Client.exe:
First you need to find the correct line, simple click "Ctrl + G" write "0047B7B2".
Code:
0047B7B2 > 68 D44C9A00 PUSH 009A4CD4 ; ASCII "SEGNALLE" 0047B7B7 . 8D5424 08 LEA EDX,DWORD PTR SS:[ESP+8] 0047B7BB . 68 444D9A00 PUSH 009A4D44 ; ASCII "%s" 0047B7C0 . 52 PUSH EDX 0047B7C1 . E8 FAE9FCFF CALL 0044A1C0 0047B7C6 . 83C4 0C ADD ESP,0C 0047B7C9 . 8D4424 04 LEA EAX,DWORD PTR SS:[ESP+4] 0047B7CD . 50 PUSH EAX 0047B7CE . 8BCE MOV ECX,ESI 0047B7D0 . E8 ABE8FCFF CALL 0044A080 0047B7D5 . 84C0 TEST AL,AL 0047B7D7 . 74 0C JE SHORT 0047B7E5 0047B7D9 . B0 04 MOV AL,4 0047B7DB . 5E POP ESI 0047B7DC . 81C4 00010000 ADD ESP,100 0047B7E2 . C2 0400 RETN 4 ADD: 0047B7E5 >-E9 16E87000 JMP 00B8A000 INSTEAD OF: 0047B7E5 68 E04C9A00 PUSH 009A4CE0 ; ASCII "WARRIOR" Keep rest of the old code: 0047B7EA . 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8] 0047B7EE . E8 BDEAFCFF CALL 0044A2B0 0047B7F3 . 50 PUSH EAX 0047B7F4 . 8BCE MOV ECX,ESI 0047B7F6 . E8 85E8FCFF CALL 0044A080 0047B7FB . 84C0 TEST AL,AL 0047B7FD . 74 0C JE SHORT 0047B80B 0047B7FF . B0 05 MOV AL,5 0047B801 . 5E POP ESI 0047B802 . 81C4 00010000 ADD ESP,100 0047B808 . C2 0400 RETN 4
Go to the new space, simple click "Ctrl + G" and write "00B8A000".
Add this in new section created by CFF Explorer(Client.exe):
Code:
00B8A000 68 E04C9A00 PUSH 009A4CE0 ; ASCII "WARRIOR" 00B8A005 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8] 00B8A009 E8 A2028CFF CALL 0044A2B0 00B8A00E 50 PUSH EAX 00B8A00F 8BCE MOV ECX,ESI 00B8A011 E8 6A008CFF CALL 0044A080 00B8A016 84C0 TEST AL,AL 00B8A018 74 0C JE SHORT 00B8A026 00B8A01A B0 05 MOV AL,5 00B8A01C 5E POP ESI 00B8A01D 81C4 00010000 ADD ESP,100 00B8A023 C2 0400 RETN 4 00B8A026 68 55A0B800 PUSH 00B8A055 ; ASCII "ALLOKEN" 00B8A02B 8D4C24 08 LEA ECX,DWORD PTR SS:[ESP+8] 00B8A02F E8 7C028CFF CALL 0044A2B0 00B8A034 50 PUSH EAX 00B8A035 8BCE MOV ECX,ESI 00B8A037 E8 44008CFF CALL 0044A080 00B8A03C 84C0 TEST AL,AL 00B8A03E 74 0C JE SHORT 00B8A04C 00B8A040 B0 06 MOV AL,6 00B8A042 5E POP ESI 00B8A043 81C4 00010000 ADD ESP,100 00B8A049 C2 0400 RETN 4 00B8A04C -E9 BA178FFF JMP 0047B80B 00B8A051 0000 ADD BYTE PTR DS:[EAX],AL 00B8A053 0000 ADD BYTE PTR DS:[EAX],AL 00B8A055 41 INC ECX 00B8A056 4C DEC ESP 00B8A057 4C DEC ESP 00B8A058 4F DEC EDI 00B8A059 4B DEC EBX 00B8A05A 45 INC EBP 00B8A05B 4E DEC ESI

DOWNLOAD


Feel free to contact me if you dont understand or dont get it working.
DONT FORGET TO HIT THANK YOU






