LtClient + 0x208...
When i inject automatic with FaithInjector , CA-EU close
i'm New Combat arms coder , i'm Cross Fire coder
Code:#include <Windows.h> #define LTClient 0x377F1D68 //MOV ECX,DWORD PTR DS:[377F1D68] bool WhiteWalls = false; void __cdecl PushToConsole( char* szCommand) { typedef int (__cdecl* PTC_t)(char* cmd); PTC_t RCC = (PTC_t) LTClient; RCC(szCommand); } void HackThread (void) { for(;;) { __asm pushad; // just an example .. only bool Wireframe = 1; if (Wireframe==1) { PushToConsole("WireFrame 1"); } __asm popad; } } BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved ) { DisableThreadLibraryCalls(hDll); if ( dwReason == DLL_PROCESS_ATTACH ) { Beep(1000,500); CreateThread(NULL,NULL,(LPTHREAD_START_ROUTINE)HackThread,NULL,NULL,NULL); } return TRUE; }
---------- Post added at 12:10 PM ---------- Previous post was at 12:09 PM ----------
Edit : i saw 0x208 on OllyDebug , have i use it ?
BlackLite (06-01-2012)
Code:#include <Windows.h> #define LTClient 0x377F1D68 //MOV ECX,DWORD PTR DS:[377F1D68] bool WhiteWalls = false; void __cdecl PushToConsole(char* szVal ) { DWORD dwCShell = (DWORD)GetModuleHandleA("CShell.dll"); if( dwCShell != NULL ) { DWORD *LTClient2 = ( DWORD* )( (dwCShell + LTClient) ); void* CONoff = ( void* )*( DWORD* )( *LTClient2 + 0x208 ); _asm { push szVal; call CONoff; add esp, 4; } } } void HackThread (void) { for(;;) { __asm pushad; if(GetAsyncKeyState(VK_F9)&1) { WhiteWalls = !WhiteWalls; } if (WhiteWalls) { PushToConsole("DrawFlat 0"); } else { PushToConsole("DrawFlat 1"); } __asm popad; } } BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved ) { DisableThreadLibraryCalls(hDll); if ( dwReason == DLL_PROCESS_ATTACH ) { Beep(1000,500); CreateThread(NULL,NULL,(LPTHREAD_START_ROUTINE)HackThread,NULL,NULL,NULL); } return TRUE; }
You're missing so many functions it would be better to just trash your code and restart.
Updated Addies gone wrong ?!!!!
We are The contributor ForceU Tottaly Jelly amiright ?Need Help VB.Net Just Ask