Register for your free account! | Forgot your password?

Go Back   elitepvpers > Shooter > WarRock > WarRock Hacks, Bots, Cheats & Exploits
You last visited: Today at 14:04

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[RELEASE] Reversing latest structures for GameServer Packet ( Send / Recv )

Discussion on [RELEASE] Reversing latest structures for GameServer Packet ( Send / Recv ) within the WarRock Hacks, Bots, Cheats & Exploits forum part of the WarRock category.

Reply
 
Old   #1
 
MRx86's Avatar
 
elite*gold: 0
Join Date: May 2013
Posts: 1,517
Received Thanks: 2,595
[RELEASE] Reversing latest structures for GameServer Packet ( Send / Recv )

structures for GameServer ( Send / Recv )



Battleye Heartbeat 31330 Below

Code:
[Structure Packet 57e4cbcc] Packet ID 31330 error code 264 vp!n˜7nvNžt<*€a2š;K;jڡ(m0hQN3f@y
Su˜“’O}ᐣp—ƒ{“Eˆ+8f‡ۢCMŒgD‰Žx:*LTHONF>l‘O^.g-R6,XO…Œ“^X™ƒK:N4CgVzF
[Structure Packet 57e4cbcc] Packet ID 31330 264 vp!n˜7nvNžt<€a2š;K;jڡ(m0hQN3f@y
Su˜“’O}ᐣp—ƒ{“Eˆ+8f‡ۢCMŒgD‰Žx:LTHONF>l‘O^.g-R6,XO…Œ“^X™ƒK:N4CgVzF
[Structure Packet 57e4cbcc] Packet ID 31330 264 vp!n˜7nvNžt<*€a2š;K;jڡ(m0hQN3f@y
Su˜“’O}ᐣp—ƒ{“Eˆ+8f‡ۢCMŒgD‰Žx:*LTHONF>l‘O^.g-R6,XO…Œ“^X™ƒK:N4CgVzF
[Structure Packet 57e4cbcc] Packet ID 31330 264 vp!n˜7nvNžt<€a2š;K;jڡ(m0hQN3f@y
Su˜“’O}ᐣp—ƒ{“Eˆ+8f‡ۢCMŒgD‰Žx:LTHONF>l‘O^.g-R6,XO…Œ“^X™ƒK:N4CgVzF
[Structure Packet 57e4cbcc] Packet ID 31330 264 vp!n˜`7nvNžt<€a2š;K;jڡ(m0hQN3f@y
Su˜“’O}ᐣp—ƒ{“Eˆ+8f‡ۢCMŒgD‰Žx:LTHONF>l‘O^.g-R6,XO…Œ“^X™ƒK:N4CgVzF

Code:
void* DetourCreate(BYTE* src, const BYTE* dst)
{
	int len = 5;
	BYTE* jmp = (BYTE*)malloc(len + 5);
	DWORD dwBack;
	VirtualProtect(src, len, PAGE_EXECUTE_READWRITE, &dwBack);
	memcpy(jmp, src, len);
	jmp += len;
	jmp[0] = 0xE9;
	*(DWORD*)(jmp + 1) = (DWORD)(src + len - jmp) - 5;
	src[0] = 0xE9;
	*(DWORD*)(src + 1) = (DWORD)(dst - src) - 5;
	VirtualProtect(src, len, dwBack, &dwBack);
	return(jmp - len);
}


class cSendPacket
{
public:
	DWORD dwTimeStamp; //0x0000 
	__int16 PacketID; //0x0004 
	__int8 RetCode; //0x0006 

}; cSendPacket* pSendPacket = NULL;


class cRecvPacket
{
   public:
	DWORD dwTimeStamp; //0x0000 
	__int16 PacketID; //0x0004 
	__int8 RetCode; //0x0006 

}; cRecvPacket* pRecvPacket = NULL;




static DWORD dwRecvECX = 0;
DWORD dwRecvJmp  = 0x8608D2;
DWORD dwRecvCall = 0x86F4CC;
__declspec (naked) void HookRecv (void)
{

	__asm mov dwRecvECX,ecx


	pRecvPacket = (cRecvPacket*)dwRecvECX;
	if (pRecvPacket)
	{
		tool->add_log("[RECV] %d %d", pRecvPacket ->TimeStamp, pRecvPacket ->PacketID );
	}


	__asm call[dwRecvCall]
	__asm jmp[dwRecvJmp]

}

static DWORD dwSendECX = 0;
DWORD dwSendJmp = 0x860772;
DWORD dwSendCall = 0x86F490;
__declspec (naked) void HookSend(void)
{

	__asm mov dwSendECX, ecx


	pSendPacket = (cSendPacket*)dwSendECX;
	if (pSendPacket)
	{
		tool->add_log("[SEND] %d %d", pSendPacket->TimeStamp, pSendPacket->PacketID );
	
	}

		__asm call[dwSendCall]
		__asm jmp[dwSendJmp]
}

		DetourCreate((BYTE*)0x8608CD,(BYTE*)HookRecv);
		DetourCreate((BYTE*)0x86076D, (BYTE*)HookSend);

Short example from the past and now

Past example was ASCII
TimeStamp PacketID 1 1 1 1 1 1 -1

Right now
TimeStamp
PacketID
RetCode
Parametar ( like 1 1 1 -1 )


A Small Hint
if you got some old client from prev changment for packet system all you need to do is just to replace your ASCII Packet corresponding uint8

from now you can reverse each class structures and doing your private server with latest client ofcourse would take time.

All Packet Structures Size is 24576 so class wouldnt be bigger then this size.

I Used for some years for clb. i just abbandoned the project
MRx86 is offline  
Thanks
1 User
Old 03/22/2025, 16:46   #2
 
elite*gold: 0
Join Date: Oct 2024
Posts: 9
Received Thanks: 0
do you have cheat for warrock?
Welgene is offline  
Reply


Similar Threads Similar Threads
[AutoIt] Packet Send/Recv
03/04/2014 - Nostale Hacks, Bots, Cheats & Exploits - 1 Replies
Aufgrund von nem Kollegen hab ichs wieder rausgenommen. Sorry. :D
[Question] Hooking send() & recv() works, but recv hiding data for co???
05/06/2009 - CO2 Programming - 2 Replies
Hey guys, I've been making a DLL to allow another program to intercept the packets of conquer using windows pipes. (Then its the job of the main program to decrypt the packets, the DLL only gives a communication channel for the main program) (winsock functions btw) - hooking send() works fine for my internet browser - hooking recv() works fine for my internet browser - hooking send() works fine for conquer online



All times are GMT +2. The time now is 14:04.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.