Register for your free account! | Forgot your password?

Go Back   elitepvpers > Coders Den > .NET Languages
You last visited: Today at 16:35

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



AoBScan result

Discussion on AoBScan result within the .NET Languages forum part of the Coders Den category.

Reply
 
Old   #1
 
KaMeR1337's Avatar
 
elite*gold: 0
Join Date: May 2008
Posts: 1,415
Received Thanks: 5,444
AoBScan result

Code:
        public async void MemoryScan()
        {
            MemLib.OpenProcess(MemLib.GetProcIdFromName("metin2client"));
            var myAoBScan = (await MemLib.AoBScan(patternText.Text)).ToArray();

            for (int i = 0; i < myAoBScan.Count(); i++)
            {
                BaseAddress = myAoBScan[i];
            }
        }
BaseAddress returns 030BA2C6 but i want return this 04CEB1F8:


how can i do it?

EDIT:
never mind got it by doing
MemLib.ReadInt(BaseAddress)
KaMeR1337 is offline  
Old 05/27/2020, 20:17   #2

 
PC Jones's Avatar
 
elite*gold: 50
The Black Market: 266/0/0
Join Date: Oct 2009
Posts: 7,096
Received Thanks: 623
Thanks for providing your solution
PC Jones is offline  
Old 06/05/2020, 08:15   #3
 
KaMeR1337's Avatar
 
elite*gold: 0
Join Date: May 2008
Posts: 1,415
Received Thanks: 5,444
now i dont know how to read address from this call:

KaMeR1337 is offline  
Old 06/07/2020, 01:51   #4
 
elite*gold: 100
Join Date: Apr 2008
Posts: 860
Received Thanks: 1,487
Quote:
Originally Posted by KaMeR1337 View Post
now i dont know how to read address from this call:

Calls (& Jumps) use indirect addressing. This means the value stored in the instruction-bytes is not using an absolute address, but a relative instead.

E8 B1 FA 0E 00 are your instruction bytes. E8 means CALL.

B1 FA 0E 00 are the bytes of the relative address. We flip them around (endianess) and get 0x000EFAB1 as a "usable" number. To get to the address 0xB4316E0, we need to add the address of the next instruction to it.
We can calculate it. 0xB341C2A is the address where the call is. The instruction bytes are 5 bytes long. So you the next address is 0xB341C2A+5 = 0xB341C2F.

0xB341C2F + 0x000EFAB1 = 0xB4316E0

You can also inline it with the current instruction address, instead of the next:

0xB341C2A + 5 + 0x000EFAB1

Or as a more generic form

Code:
call_absolute_address = next_instruction_address + call_indirect_address

// - or -

call_absolute_address = current_instruction_address + instruction_byte_count + call_indirect_address

Keep in mind that the indirect address can also be negative. This means the call destination comes "before" the address the call happens.

PS: According to the definition of the call instruction, the indirect address might also be 16 instead of 32 bit; only half the size. Eventho it's allowed, I've never seen it actually happen.
florian0 is offline  
Thanks
2 Users
Reply


Similar Threads Similar Threads
Cheat Engine aobscan in Autoit
08/21/2022 - AutoIt - 3 Replies
Moin Leute, ich wollte mal nachfragen ob es in Autoit möglich ist, eine Cheat Engine aob script zu injecten. Hier ist der Script den ich gerne injecten würde: //code from here to '' will be used to enable the cheat alloc(newmem,2048) //2kb should be enough label(returnhere) label(originalcode) label(exit) label(whatever)
'AOBSCAN' is not declared. It may be inaccessible due to its protection level.
07/29/2015 - .NET Languages - 10 Replies
Nun wollte ich ein Trainer machen, der die Adressen halt automatisch sich per Patterns aktualisiert. Nun bekomm ich ein Fehler und verstehe nicht wie ich es beheben könnte. Public Class Form1 Private Sub CheckBox1_CheckedChanged(sender As Object, e As EventArgs) Handles CheckBox1.CheckedChanged Dim SP As Int32 = AOBSCAN("S4Client", "S4Client.exe", New Byte() {&HD9, &H45, &HF8, &H8B, &HE5, &H5D, &HC3, &HCC, &HCC, &HCC, &HCC, &HCC, &HCC, &HCC, &H55, &H8B, &HEC, &H51, &H89, &H4D})...
Cheat Engine aobscan in Autoit
11/27/2013 - General Coding - 3 Replies
Moin Leute, ich wollte mal nachfragen ob es in Autoit möglich ist, eine Cheat Engine aob script zu injecten. Hier ist der Script den ich gerne injecten würde: //code from here to '' will be used to enable the cheat alloc(newmem,2048) //2kb should be enough label(returnhere) label(originalcode) label(exit) label(whatever)
Help ^^' (aobscan)
07/04/2013 - Dekaron - 2 Replies
Hi! I'm not a pro hacker yet and I have a lame question for advanced users. I tried to use Gawron's mass spawn by using Cheat Engine (on Dk Rising pserver). I know how to copy/paste/assign scripts but when I click on execute button, an error window pops up. It says something about aobscan. Can anybody tell me something useful about this? Thank you.:handsdown: P.S I pressed the search button but it didn't help :p Thanks in advance!! http://img541.imageshack.us/img541/474/w83i.jpg



All times are GMT +1. The time now is 16:36.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.