Register for your free account! | Forgot your password?

You last visited: Today at 00:20

  • Please register to post and access all features, it's quick, easy and FREE!


How To Find Addys In Warrock

Reply
 
Old   #1
 
elite*gold: LOCKED
Join Date: Dec 2009
Posts: 493
Received Thanks: 245
How To Find Addys In Warrock

Short example how to find x,y,z, offsets and serverpointer


English

Open Unpacked WarRock , I'm using Ida Pro , and search for
text string ( %.1f, %.1f, %.1f ) , and it will appear in sub like
this below , I added commands what is what ,



PHP Code:

push esi
call sub_4E6430
add esp, 4
test eax, eax
jz short loc_4A1641
mov ecx, dword_B19D98 ; << Server Pointer (0xB19D98 )
cmp esi, [ecx+0E0AACh]
mov ecx, offset asc_983EC0 ; "*"
jz short loc_4A1606
mov ecx, offset byte_97F6A4

fld dword ptr [eax+2C4h] ; << Offset Z (0x2C4)
sub esp, 18h
fstp qword ptr [esp+10h]
lea edx, [esi+4]
fld dword ptr [eax+2C0h] ; << Offset Y (super jump) (0x2C0)
fstp qword ptr [esp+8]
fld dword ptr [eax+2BCh] ; << Offset X(0x2BC)
mov eax, dword_AD5CD0
fstp qword ptr [esp]
push esi
push ecx
push offset aS2dSPos_1f_1f_ ; "%s%2d's Pos : ( %.1f, %.1f, %.1f )"
push edx
push eax
call sub_7C1310
add esp, 2Ch
jmp short loc_4A1659



Deutsch

Kleines Beispiel zum Finden der X Y und Z offsets und des Serverpointers

öffne die unpacked Warrock.exe mit einem Debugger wie Ida Pro, und suche nach
"text string ( %.1f, %.1f, %.1f )" und es wird dir etwas in der Art angezeigt, ich habe noch die Funktionen hinzugefügt was was ist:


Code:

push esi
call sub_4E6430
add esp, 4
test eax, eax
jz short loc_4A1641
mov ecx, dword_B19D98 ; << Server Pointer (0xB19D98 )
cmp esi, [ecx+0E0AACh]
mov ecx, offset asc_983EC0 ; "*"
jz short loc_4A1606
mov ecx, offset byte_97F6A4

fld dword ptr [eax+2C4h] ; << Offset Z (0x2C4)
sub esp, 18h
fstp qword ptr [esp+10h]
lea edx, [esi+4]
fld dword ptr [eax+2C0h] ; << Offset Y (super jump) (0x2C0)
fstp qword ptr [esp+8]
fld dword ptr [eax+2BCh] ; << Offset X(0x2BC)
mov eax, dword_AD5CD0
fstp qword ptr [esp]
push esi
push ecx
push offset aS2dSPos_1f_1f_ ; "%s%2d's Pos : ( %.1f, %.1f, %.1f )"
push edx
push eax
call sub_7C1310
add esp, 2Ch
jmp short loc_4A1659

Special Thanks to Vistaxxxl



th3man0f22 is offline  
Thanks
12 Users
Old 09/01/2010, 12:30   #2
 
elite*gold: 0
Join Date: Jun 2010
Posts: 74
Received Thanks: 46
year the first Guide for Addylogging in Warrock
I'll test it later.

MFG vistaxxxl


vistaxxxl is offline  
Old 09/01/2010, 12:45   #3
 
elite*gold: LOCKED
Join Date: Aug 2010
Posts: 117
Received Thanks: 15
Danke...aber leider kann ich nicht so gut englisch...wird wohl ne weile dauern bis ich das verstanden habe
MilchEis is offline  
Old 09/01/2010, 14:13   #4
 
elite*gold: 0
Join Date: Jun 2010
Posts: 74
Received Thanks: 46
Talking

ok ich übersetze mal:


Quote:
Kleines Beispiel zum Finden der X Y und Z offsets und des Serverpointers

öffne die unpacked Warrock.exe mit einem Debugger wie Ida Pro, und suche nach
"text string ( %.1f, %.1f, %.1f )" und es wird dir etwas in der Art angezeigt, ich habe noch die Funktionen hinzugefügt was was ist:


Code:
push esi
call sub_4E6430
add esp, 4
test eax, eax
jz short loc_4A1641
mov ecx, dword_B19D98 ; << Server Pointer (0xB19D98 )
cmp esi, [ecx+0E0AACh]
mov ecx, offset asc_983EC0 ; "*"
jz short loc_4A1606
mov ecx, offset byte_97F6A4

fld dword ptr [eax+2C4h] ; << Offset Z (0x2C4)
sub esp, 18h
fstp qword ptr [esp+10h]
lea edx, [esi+4]
fld dword ptr [eax+2C0h] ; << Offset Y (super jump) (0x2C0)
fstp qword ptr [esp+8]
fld dword ptr [eax+2BCh] ; << Offset X(0x2BC)
mov eax, dword_AD5CD0
fstp qword ptr [esp]
push esi
push ecx
push offset aS2dSPos_1f_1f_ ; "%s%2d's Pos : ( %.1f, %.1f, %.1f )"
push edx
push eax
call sub_7C1310
add esp, 2Ch
jmp short loc_4A1659
bitte nicht vergessen es ist sein tutorial/guide also gibt ihm auch ein Thanks falls ihr (fast) kein Englisch könnt und mir ein thx gegeben habt.

MFG vistaxxxl


vistaxxxl is offline  
Thanks
3 Users
Old 09/01/2010, 14:27   #5
 
elite*gold: 50
Join Date: Feb 2009
Posts: 4,545
Received Thanks: 480
Es gibt genug Programme die die Addys selber loggen....
BloodyMustang is offline  
Old 09/01/2010, 21:12   #6
 
elite*gold: 0
Join Date: Jun 2010
Posts: 74
Received Thanks: 46
Quote:
Es gibt genug Programme die die Addys selber loggen....
nur allzu schade, dass davon im moment KEINS funktioniert

MFG vistaxxl
vistaxxxl is offline  
Old 09/01/2010, 23:18   #7
 
elite*gold: 2
Join Date: May 2010
Posts: 2,913
Received Thanks: 1,565
Really nice guide, thank you

But could you pls explain, how do you know, what´s the serverpointer string, and whats the ofs_z string? I don´t really get it.
Lucky Strike™ is offline  
Old 09/02/2010, 01:24   #8
 
elite*gold: 11
Join Date: Apr 2010
Posts: 1,604
Received Thanks: 1,206
PHP Code:
#define ADR_PLAYERPOINTER 0x00AA6DB8 //Found at: 0x00417D8E ( WarRock.exe[0x00400000] + 0x00017D8E )
#define ADR_SERVERPOINTER 0x009A1DD8 //Found at: 0x004143AE ( WarRock.exe[0x00400000] + 0x000143AE )
#define ADR_BASEPOINTER 0x009DC1D8 //Found at: 0x00469511 ( WarRock.exe[0x00400000] + 0x00069511 )
#define ADR_HEALTHPOINTER 0x009DDD64 //Found at: 0x00421E6C ( WarRock.exe[0x00400000] + 0x00021E6C )
#define ADR_USERBASE 0x00AA6E04 //Found at: 0x004148A6 ( WarRock.exe[0x00400000] + 0x000148A6 )
#define ADR_CLASSBASE 0x0080DCD4 //Found at: 0x00423CC8 ( WarRock.exe[0x00400000] + 0x00023CC8 )
#define ADR_WEAPONBASE 0x008F3CBC //Found at: 0x0040CEE3 ( WarRock.exe[0x00400000] + 0x0000CEE3 )
#define Team_Base 0x009DDEA0 //Found at: 0x00415162 ( WarRock.exe[0x00400000] + 0x00015162 )
#define ADR_SLOTBASE 0x000D02D8 //Found at: 0x0051F5C9 ( WarRock.exe[0x00400000] + 0x0011F5C9 )
#define ADR_ViewAngles 0x008ED4C4 //Found at: 0x0040CF0F ( WarRock.exe[0x00400000] + 0x0000CF0F )
#define ADR_SPEED 0x007B55C4 //Found at: 0x004DFC9D ( WarRock.exe[0x00400000] + 0x000DFC9D )
#define ADR_GLASSWALLS 0x008F3758 //Found at: 0x00463B45 ( WarRock.exe[0x00400000] + 0x00063B45 )
#define ADR_NOSPREAD 0x008ED878 //Found at: 0x0045CBDE ( WarRock.exe[0x00400000] + 0x0005CBDE )
#define ADR_NOBOUNDS1 0x00912E44 //Found at: 0x00457446 ( WarRock.exe[0x00400000] + 0x00057446 )
#define ADR_NOBOUNDS2 0x00912E3C //Found at: 0x00457483 ( WarRock.exe[0x00400000] + 0x00057483 )
#define ADR_NOBOUNDS3 0x00912E40 //Found at: 0x0045747B ( WarRock.exe[0x00400000] + 0x0005747B )
#define ADR_INSTANTSPAWN1 0x0095B5F0 //Found at: 0x0046A3E0 ( WarRock.exe[0x00400000] + 0x0006A3E0 )
#define ADR_INSTANTSPAWN2 0x008F0DB4 //Found at: 0x0041EB00 ( WarRock.exe[0x00400000] + 0x0001EB00 )
#define ADR_CQCSPAWN 0x0080DCC4 //Found at: 0x0042E6E7 ( WarRock.exe[0x00400000] + 0x0002E6E7 )
#define ADR_SCOPE 0x0080DCD4 //Found at: 0x00417CF4 ( WarRock.exe[0x00400000] + 0x00017CF4 )
#define Near_Fog 0x008F3754 //Found at: 0x0043B9AB ( WarRock.exe[0x00400000] + 0x0003B9AB )
#define Far_Fog 0x008F3758 //Found at: 0x00463B45 ( WarRock.exe[0x00400000] + 0x00063B45 )
#define ADR_GMWARNING 0x0080DCFC //Found at: 0x00417CED ( WarRock.exe[0x00400000] + 0x00017CED )
#define ADR_FastLockon 0x008ED888 //Found at: 0x0043147B ( WarRock.exe[0x00400000] + 0x0003147B )
#define ADR_ImDrunk 0x00957C68 //Found at: 0x00422622 ( WarRock.exe[0x00400000] + 0x00022622 )
#define ADR_FASTAMMO 0x008F0D1C //Found at: 0x0042B26F ( WarRock.exe[0x00400000] + 0x0002B26F )
#define ADR_FASTFLAG 0x008F0D28 //Found at: 0x0045273A ( WarRock.exe[0x00400000] + 0x0005273A )
#define ADR_FASTHEALTH 0x008F0D20 //Found at: 0x0042B2C6 ( WarRock.exe[0x00400000] + 0x0002B2C6 )
#define ADR_FASTREPAIR 0x008F0D14 //Found at: 0x0042B32A ( WarRock.exe[0x00400000] + 0x0002B32A )
#define ADR_ANTIAFK 0x0045E999 //WarRock.exe[0x00400000] + 0x0005E999
#define ADR_HIGHVIEW 0x007A89CC //Found at: 0x00421AE6 ( WarRock.exe[0x00400000] + 0x00021AE6 )
#define ADR_WEAPONGRAVITY 0x007AAEF0 //Found at: 0x0042C528 ( WarRock.exe[0x00400000] + 0x0002C528 )
#define ADR_TRIGGERBOT 0x0080DD30 //Found at: 0x005136BC ( WarRock.exe[0x00400000] + 0x001136BC ) 

keine aktuellen addys aber da steht ja noch mehr wers gebrauchen kann ^^
HackTec is offline  
Old 09/02/2010, 23:20   #9
 
elite*gold: 0
Join Date: Feb 2010
Posts: 1,007
Received Thanks: 801
Leute das ist schon alt....

Man Findet OFS X Y Z nichtmehr unter "text string ( %.1f, %.1f, %.1f )" ...

Was meint ihr warum die meisten Addylogger nimmer gehen..
Inqlorius is offline  
Old 09/03/2010, 06:53   #10
 
elite*gold: 10
Join Date: Sep 2010
Posts: 1,880
Received Thanks: 193
gibt ja adddy updater
b0bh34d is offline  
Old 12/22/2010, 18:38   #11
 
elite*gold: 0
Join Date: Feb 2010
Posts: 86
Received Thanks: 52
weis den jemand die neuen text strings ? ich breuchte nen paar,


Hacker246 is offline  
Reply



« [New Crosshair] made by Mirco ;D | modifizierter Sprite Ordner »

Similar Threads
[Guide]Find WarRock Addys
01/17/2011 - WarRock Guides, Tutorials & Modifications - 18 Replies
^This. Hallo e*pvplers, in diesem Guide zeige ich euch wie ihr Addys in WarRock findet. dazu benötigen wir : Dumped WarRock.exe (link wird wöchentlich geupdated ;) ) OllyDbg
Someone give me a guide to find Addys for no cooldown etc.
09/12/2010 - Cabal PServer - Discussions / Questions - 1 Replies
i been searching this forum and google but i get helpless threads. Help please ><.
[WarRock] Addys 01.04.10, Update Addys and Offsets
04/01/2010 - Cabal Hacks, Bots, Cheats, Exploits & Macros - 2 Replies
Hallo diese Addys habe ich von anderen forum kopiert nicht denken ich habe sie selbst wollte sie für euch rein packen <3.. Hier die Addys: Wenn du 0x00 da stehen hast kann es sein, dass du die 00 wegnehemen musst.



All times are GMT +2. The time now is 00:20.


Powered by vBulletin®
Copyright ©2000 - 2018, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Abuse
Copyright ©2018 elitepvpers All Rights Reserved.