|
You last visited: Today at 17:20
Advertisement
WriteFloatPointer / WriteLongPointer
Discussion on WriteFloatPointer / WriteLongPointer within the General Coding forum part of the Coders Den category.
05/06/2009, 19:46
|
#1
|
elite*gold: 0
Join Date: May 2009
Posts: 5
Received Thanks: 0
|
WriteFloatPointer / WriteLongPointer
Hi,
weiß einer wie man diese Funktionen in VB8 deklariert?
|
|
|
05/06/2009, 19:58
|
#2
|
elite*gold: 0
Join Date: Apr 2007
Posts: 943
Received Thanks: 132
|
Diese Funktionen gibts nich inner WinAPI.
*Glaskugel auspack*
Wenn du einen Float in die Adresse die im Pointer steht schreiben willst würde ich erst per ReadProcessMemory den Pointer auslesen um dann per WriteProcessMemory den Float reinzuschreiben
*Google auspack*
Lass mich raten:
Du befolgst gerade ein Warrock Hack Tutorial und willst alles einfach rauskopieren -> Versuch dich erstmal an was einfacherem wenn du die Basics nicht verstehts.
|
|
|
05/06/2009, 20:22
|
#3
|
elite*gold: 0
Join Date: Apr 2009
Posts: 67
Received Thanks: 83
|
Bist mir zuvor gekommen.
Ach, ich ignoriere dein Post einfach.
------
WriteFloatPointer gibt es unter den .NET Funktionen nicht.
Eine Funktion des Windows Application Programming Interfaces ist es auch nicht.
Ich schätze mal, dass es eine Funktion eines Wrappers irgendeines Noobie-Forums ist (wahrscheinlich eine WarRock-VB6/.NET-1337-h4X0r-Community, da tollen sowieso die tollsten Leutchen herum).
Schau mal, was ich über Google gefunden habe (musste nur ein paar Tabs zur schönen Formatierung einfügen ;-) :
PHP Code:
Private Declare Function OpenProcess Lib "kernel32" Alias "OpenProcess" (ByVal dwDesiredAccess As Integer, ByVal bInheritHandle As Integer, ByVal dwProcessId As Integer) As Integer
Private Declare Function WriteProcessMemory Lib "kernel32" Alias "WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer
Private Declare Function WriteFloatMemory Lib "kernel32" Alias "WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Single, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer
Private Declare Function ReadFloat Lib "kernel32" Alias "ReadProcessMemory" (ByVal hProcess As IntPtr, ByVal lpBaseAddress As IntPtr, ByRef buffer As Single, ByVal size As Int32, ByRef lpNumberOfBytesRead As Int32) As Boolean
Private Declare Function ReadProcessMemory Lib "kernel32" Alias "ReadProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer
Private Declare Function CloseHandle Lib "kernel32" Alias "CloseHandle" (ByVal hObject As Integer) As Integer
Public Declare Function GetAsyncKeyState Lib "user32" Alias "GetAsyncKeyState" (ByVal vKey As Long) As Integer
Public RBuff1 As Long
Public RBuff2 As Single
Public RBuff3 As Integer
'WriteMemory
Public Function WriteMemory(ByVal Address As Integer, ByVal Value As Long, ByVal Bytes As Integer)
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
WriteProcessMemory(processHandle, Address, Value, Bytes, Nothing)
CloseHandle(processHandle)
End Function
'ReadFloat
Public Function ReadFloat(ByVal Address As Single)
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
ReadProcessMemory(processHandle, Address, RBuff1, 4, Nothing)
CloseHandle(processHandle)
Return RBuff1
End Function
'WriteFloat
Public Function WriteFloat(ByVal Address As Integer, ByVal Value As Single)
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
WriteFloatMemory(processHandle, Address, Value, 4, Nothing)
CloseHandle(processHandle)
End Function
'ReadLong
Public Function ReadLong(ByVal Address As Integer)
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
ReadProcessMemory(processHandle, Address, RBuff1, 4, Nothing)
CloseHandle(processHandle)
Return RBuff1
End Function
'ReadFloatPointer
Public Function ReadFloatPointer(ByVal Base As Integer, ByVal Offset As Short)
Dim fullAddress As Long
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
ReadProcessMemory(processHandle, Base, RBuff1, 4, Nothing)
fullAddress = RBuff1 + Offset
ReadFloat(processHandle, fullAddress, RBuff2, 4, Nothing)
Return RBuff2
CloseHandle(processHandle)
End Function
'ReadLongPointer
Public Function ReadLongPointer(ByVal Base As Integer, ByVal Offset As Short, ByVal Bytes As Integer)
Dim fullAddress As Long
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
ReadProcessMemory(processHandle, Base, RBuff1, 4, Nothing)
fullAddress = RBuff1 + Offset
ReadProcessMemory(processHandle, fullAddress, RBuff3, Bytes, Nothing)
Return RBuff3
CloseHandle(processHandle)
End Function
'WriteFloatPointer
Public Function WriteFloatPointer(ByVal Base As Integer, ByVal Offset As Short, ByVal Value As Single)
Dim fullAddress As Long
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
ReadProcessMemory(processHandle, Base, RBuff1, 4, Nothing)
fullAddress = RBuff1 + Offset
WriteFloatMemory(processHandle, fullAddress, Value, 4, Nothing)
CloseHandle(processHandle)
End Function
'WriteLongPointer
Public Function WriteLongPointer(ByVal Base As Integer, ByVal Offset As Short, ByVal Value As Long, ByVal Bytes As Integer)
Dim fullAddress As Long
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
ReadProcessMemory(processHandle, Base, RBuff1, 4, Nothing)
fullAddress = RBuff1 + Offset
WriteProcessMemory(processHandle, fullAddress, Value, Bytes, Nothing)
CloseHandle(processHandle)
End Function
'NOP
Public Function NOP(ByVal Address As Integer, ByVal value As Integer)
Dim warrockLookUp As Process() = Process.GetProcessesByName("WarRock")
If warrockLookUp.Length = 0 Then
End
End If
Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, warrockLookUp(0).Id)
WriteProcessMemory(processHandle, Address, value, 1, Nothing)
CloseHandle(processHandle)
End Function
|
|
|
05/06/2009, 20:28
|
#4
|
elite*gold: 0
Join Date: May 2009
Posts: 5
Received Thanks: 0
|
Ich will das nicht auf WarRock anwenden (funktioniert VB da eh nicht mehr?),
sondern schlicht und einfach auf irgendeinen Prozess (ohne AntiCheat-Schutz)
|
|
|
05/06/2009, 20:35
|
#5
|
elite*gold: 0
Join Date: Apr 2007
Posts: 943
Received Thanks: 132
|
Dann schreib einfach was du mit den Funktionen bewirken willst, da man in den Funktionsnamen viel reininterpretieren kann.
|
|
|
05/14/2009, 14:21
|
#6
|
elite*gold: 0
Join Date: May 2008
Posts: 86
Received Thanks: 24
|
Hat jemand au neue Hacks alle wurden gesperrt aber ich habe schon wieder Hacker gesehen HEUTE PLS sagt mir was wegn neuen Hacks ICQ: 429105643 oder E-Mail:
|
|
|
All times are GMT +2. The time now is 17:21.
|
|