Page 2 of 2 FirstFirst 12
Results 16 to 30 of 30
  1. #16
    Void's Avatar
    Join Date
    Sep 2009
    Gender
    male
    Location
    Inline.
    Posts
    3,193
    Reputation
    205
    Thanks
    1,438
    My Mood
    Mellow
    You put virtualProtect and memset together in a function. GJ.

  2. The Following 3 Users Say Thank You to Void For This Useful Post:

    -0x00 (10-23-2010),whatup777 (10-23-2010),why06 (10-23-2010)

  3. #17
    budman821's Avatar
    Join Date
    Aug 2010
    Gender
    male
    Posts
    356
    Reputation
    5
    Thanks
    83
    Guys, he is just posting a differen't nopping method. No need to ask why or anything else. It's not needed.

  4. The Following User Says Thank You to budman821 For This Useful Post:

    -0x00 (10-23-2010)

  5. #18
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    Quote Originally Posted by DBag4Life69 View Post


    He only quit helping this site out...
    He's not gonna release anything here anymore... That's what he told me.
    He's here to watch any possible failures :L

    Quote Originally Posted by budman821 View Post
    Guys, he is just posting a differen't nopping method. No need to ask why or anything else. It's not needed.
    Uhh, it's just a renamed method of another method that's in widespread use... What it does, and how it does it is exactly the same.

  6. The Following User Says Thank You to freedompeace For This Useful Post:

    -0x00 (10-23-2010)

  7. #19
    Capevaldo's Avatar
    Join Date
    Mar 2009
    Gender
    male
    Location
    CWBeats
    Posts
    5,518
    Reputation
    242
    Thanks
    1,145
    My Mood
    Drunk
    0x90 is a reference to nothing?

  8. #20
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    Quote Originally Posted by CaPeVaLdO View Post
    0x90 is a reference to nothing?
    Pretty much.

  9. #21
    Disturbed's Avatar
    Join Date
    Feb 2009
    Gender
    male
    Posts
    10,405
    Reputation
    1063
    Thanks
    2,559
    Quote Originally Posted by Aqollo View Post
    what does this do?? Does it have to do with the number of bytes or something ..
    It tells the preprocessor to replace anything that is NOP_BYTES with 0x90 for the compiler.

    Now go learn C++.


  10. #22
    fvestrgenrl's Avatar
    Join Date
    Jan 2009
    Gender
    male
    Posts
    172
    Reputation
    9
    Thanks
    26
    LOL @ "antinoob" so fucking obvious

  11. #23
    DreadKyller's Avatar
    Join Date
    Sep 2010
    Gender
    male
    Posts
    122
    Reputation
    12
    Thanks
    21
    Quote Originally Posted by fvestrgenrl View Post
    LOL @ "antinoob" so fucking obvious
    I agree, I barely know C++ and saw the anti-nub the first time I looked through it.


    x90 is a byte for nothing
    Really, I thought x00 was, strange /

  12. #24
    seeplusplus's Avatar
    Join Date
    Sep 2010
    Gender
    male
    Location
    Massachusetts
    Posts
    329
    Reputation
    8
    Thanks
    85
    I edited it...
    Goals:
    Green = Done
    Blue = Getting Somewhere
    Red = Not Done
    • Mouse Grid
    • PTC Method
    • Trigger Bot

    I'm trying to think of more stuff!

  13. #25
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    818
    Reputation
    125
    Thanks
    1,785
    My Mood
    Doh
    So "WriteProcessMemory" & "ReadProcessMemory" API's Does'nt work on cshell? or does it get detected?

    First time here and just wanted to get heads up before I start looking into Combat Arms Hacks... Also I notice that most people hard patch there address after dumping, Is there a reason for this? does CA detect memory hacks? VirtualProtect is used for Changing the protection of a region, but i just wanted to know why you guys are using "MemSet"? I dont code in C++, but can read it fine, Just interested why you don't use WriteProcessMemory

  14. #26
    ac1d_buRn's Avatar
    Join Date
    Aug 2009
    Gender
    female
    Location
    CA Source Section
    Posts
    3,406
    Reputation
    157
    Thanks
    3,991
    My Mood
    Flirty
    Quote Originally Posted by Departure View Post
    So "WriteProcessMemory" & "ReadProcessMemory" API's Does'nt work on cshell? or does it get detected?

    First time here and just wanted to get heads up before I start looking into Combat Arms Hacks... Also I notice that most people hard patch there address after dumping, Is there a reason for this? does CA detect memory hacks? VirtualProtect is used for Changing the protection of a region, but i just wanted to know why you guys are using "MemSet"? I dont code in C++, but can read it fine, Just interested why you don't use WriteProcessMemory
    they work just fine in cshell. Combat Arms has recently added a check when you join in game, too see if any memory is being modified and if console commands have been used.

    I remember asking the same question about WPM when i started hacking CA. I think the answer was something along the lines of, "You've already hooked into CA, and can do direct memory edits, So you dont need to get the process again " or something like that. I cant remember

  15. #27
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    818
    Reputation
    125
    Thanks
    1,785
    My Mood
    Doh
    k that makes sense, I just found what this PTC is (PushToConsole).. so if they have just added these checks then how is it possible to modify memory addresses? also found an example template in C++ it was easy to understand, but does this Dll get added to the cshell IAT(Import Address Table) or does it get injected by using allocatememory? I have written 2 programs which can do both, 1 for adding any dll and its exported functions to a exe(or dll) and another that will inject a dll into a running process... But now you have said that CA searches for modified bytes so neither of these methods are of any use? does CA have some sort of integrity checking? are the hacks applyed to cshell or CombatArms.exe? you said it WPM and RPM should work fine in cshell but how is that possiable of they are checking?

  16. #28
    ac1d_buRn's Avatar
    Join Date
    Aug 2009
    Gender
    female
    Location
    CA Source Section
    Posts
    3,406
    Reputation
    157
    Thanks
    3,991
    My Mood
    Flirty
    Quote Originally Posted by Departure View Post
    k that makes sense, I just found what this PTC is (PushToConsole).. so if they have just added these checks then how is it possible to modify memory addresses? also found an example template in C++ it was easy to understand, but does this Dll get added to the cshell IAT(Import Address Table) or does it get injected by using allocatememory? I have written 2 programs which can do both, 1 for adding any dll and its exported functions to a exe(or dll) and another that will inject a dll into a running process... But now you have said that CA searches for modified bytes so neither of these methods are of any use? does CA have some sort of integrity checking? are the hacks applyed to cshell or CombatArms.exe? you said it WPM and RPM should work fine in cshell but how is that possiable of they are checking?
    You inject the DLL into the process.
    Its possible because it only checks for memory modifications while joining a game, So if you turn all hacks off while your in the lobby, join a game, then turn them back on again, it will work.

    I have been reading around on forums and a soultion would be to check if you are ingame before you push commands/ memory edits.
    You would do this by seeing if LTClient + 0x8C returns 1

  17. #29
    Departure's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    818
    Reputation
    125
    Thanks
    1,785
    My Mood
    Doh
    Thanks your being a great help, I have a few other questions, whats the "LTClient"? Also is there any reason we can'nt add our custom dll to the Import table? that way it loads our custom dll without injection, just as it would load any other imports... or does it have integrity check of cshell.dll? if thats the case adding the custom dll to import table wont work because of the hash will be different and size will slightly grow.

  18. #30
    ac1d_buRn's Avatar
    Join Date
    Aug 2009
    Gender
    female
    Location
    CA Source Section
    Posts
    3,406
    Reputation
    157
    Thanks
    3,991
    My Mood
    Flirty
    Quote Originally Posted by Departure View Post
    Thanks your being a great help, I have a few other questions, whats the "LTClient"? Also is there any reason we can'nt add our custom dll to the Import table? that way it loads our custom dll without injection, just as it would load any other imports... or does it have integrity check of cshell.dll? if thats the case adding the custom dll to import table wont work because of the hash will be different and size will slightly grow.
    No problem.
    The LTClient = LithTech Client. Combat Arms is run off the Lith-Tech engine.
    If you would like to get an idea of how it works, Take a look at the F.E.A.R SDK, as they both use LithTech

    And as for adding the dll to the import table, I have no idea on that.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. [Release]NoRecoil Easy Way
    By ploxide in forum Combat Arms Hacks & Cheats
    Replies: 41
    Last Post: 08-16-2008, 11:50 AM
  2. Release Nop Generator v1.0 4 bytes
    By branso in forum Visual Basic Programming
    Replies: 4
    Last Post: 01-21-2008, 03:05 AM
  3. [release]Nop Generator v2.0 4 bytes
    By branso in forum WarRock - International Hacks
    Replies: 11
    Last Post: 01-16-2008, 04:05 PM
  4. Release} 10hacks in one (best way to get banned)
    By obsedianpk in forum WarRock - International Hacks
    Replies: 5
    Last Post: 10-23-2007, 03:40 AM
  5. [RELEASE]Ways to fix up HW ban
    By TechNixz in forum WarRock - International Hacks
    Replies: 4
    Last Post: 12-28-2006, 02:41 PM