Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 33
  1. #16
    Jorndel's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    Norway
    Posts
    8,676
    Reputation
    905
    Thanks
    19,112
    My Mood
    Angelic
    Quote Originally Posted by Zeraxis View Post
    Where would I even find assembly code like this on the internet? It isn't very common to code in...
    Well, you can easy google such stuff but

    (ASM Code)
    https://www.mpgh.net/forum/31-c-c-pro...y-hacking.html

    All you need now is the Main Function and you're ready to go I suppose


    Note: I'm not saying you did. Just telling that it's possible.
    Last edited by Jorndel; 03-22-2013 at 02:01 PM.

     
    Contributor 01.27.2012 - N/A
    Donator 07-17-2012 - Current
    Editor/Manager 12-16-12 - N/A
    Minion 01-10-2013 - 07.17.13
    Former Staff 09-20-2012 - 01-10-2013 / 07-17-2013 - Current
    Cocksucker 20-04-2013 - N/A

  2. #17
    Zeraxis's Avatar
    Join Date
    Dec 2011
    Gender
    male
    Posts
    108
    Reputation
    10
    Thanks
    6,759
    My Mood
    Inspired
    Quote Originally Posted by Jorndel View Post


    Well, you can easy google such stuff but

    (ASM Code)
    https://www.mpgh.net/forum/31-c-c-pro...y-hacking.html

    All you need now is the Main Function and you're ready to go I suppose


    Note: I'm not saying you did. Just telling that it's possible.
    Well, that's not all you need to do. First you have to call VirtualProtect and then mov the value in. In my code I made a function that did all this for me. Plus I only used pure assembly instead of all the macros MASM has like the proc declaration. Without it the function I made looks like this:
    Code:
    push ebp
    mov ebp, esp
    
    mov ebx, dword ptr [ebp+8]
    mov edx, dword ptr [ebp+0Ch]
    mov eax, dword ptr [ebp+10h]
    
    push eax
    push ebx
    push edx
    push offset oldProt
    push 40h
    push eax
    push ebx
    call VirtualProtect
    pop edx
    pop ebx
    pop eax
    		
    xor ecx, ecx
    patch:
        mov byte ptr [ebx+ecx], dl
        inc ecx
        cmp ecx, eax
        jne patch
    		
    push 0
    push oldProt
    push eax
    push ebx
    call VirtualProtect
    
    mov esp, ebp
    pop ebp
    retn
    Anyone that knows ASM can use that if they want as long as they give me credit
    If anyone still doesn't believe me I could explain how the function works too.

  3. #18
    Darkness cannot be defeated. It can only be hidden in the form of hatred
    MPGH Member
    Demonz.'s Avatar
    Join Date
    Jul 2010
    Gender
    male
    Posts
    638
    Reputation
    6
    Thanks
    56
    My Mood
    Breezy
    Detected on PB servers.

    WinXP 32bit.
    [IMG]https://i1179.photobucke*****m/albums/x386/gaara4life12/asdasd.png[/IMG]

  4. #19
    Jorndel's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    Norway
    Posts
    8,676
    Reputation
    905
    Thanks
    19,112
    My Mood
    Angelic
    Quote Originally Posted by Zeraxis View Post
    Well, that's not all you need to do. First you have to call VirtualProtect and then mov the value in. In my code I made a function that did all this for me. Plus I only used pure assembly instead of all the macros MASM has like the proc declaration. Without it the function I made looks like this:
    Code:
    push ebp
    mov ebp, esp
    
    mov ebx, dword ptr [ebp+8]
    mov edx, dword ptr [ebp+0Ch]
    mov eax, dword ptr [ebp+10h]
    
    push eax
    push ebx
    push edx
    push offset oldProt
    push 40h
    push eax
    push ebx
    call VirtualProtect
    pop edx
    pop ebx
    pop eax
    		
    xor ecx, ecx
    patch:
        mov byte ptr [ebx+ecx], dl
        inc ecx
        cmp ecx, eax
        jne patch
    		
    push 0
    push oldProt
    push eax
    push ebx
    call VirtualProtect
    
    mov esp, ebp
    pop ebp
    retn
    Anyone that knows ASM can use that if they want as long as they give me credit
    If anyone still doesn't believe me I could explain how the function works too.
    Well, nice of you to share but, this is the internet. (People don't always like to give credit :S)
    And yeah, I found something that seems easier for us "normal" coders
    https://www.mpgh.net/forum/604-call-d...s-like-me.html


    Thanks for the contribution tho

     
    Contributor 01.27.2012 - N/A
    Donator 07-17-2012 - Current
    Editor/Manager 12-16-12 - N/A
    Minion 01-10-2013 - 07.17.13
    Former Staff 09-20-2012 - 01-10-2013 / 07-17-2013 - Current
    Cocksucker 20-04-2013 - N/A

  5. #20
    Zeraxis's Avatar
    Join Date
    Dec 2011
    Gender
    male
    Posts
    108
    Reputation
    10
    Thanks
    6,759
    My Mood
    Inspired
    Quote Originally Posted by Jorndel View Post


    Well, nice of you to share but, this is the internet. (People don't always like to give credit :S)
    And yeah, I found something that seems easier for us "normal" coders
    https://www.mpgh.net/forum/604-call-d...s-like-me.html


    Thanks for the contribution tho
    lol, yeah that definitely is a lot easier. I was just learning assembly and wanted to make something with it. It was kind of just a challenge for myself

    ---------- Post added at 02:35 PM ---------- Previous post was at 02:32 PM ----------

    Quote Originally Posted by Kyouz View Post
    Detected on PB servers.

    WinXP 32bit.
    Thanks for letting me know

  6. The Following User Says Thank You to Zeraxis For This Useful Post:

    Jorndel (03-22-2013)

  7. #21
    R3Dx666†'s Avatar
    Join Date
    Sep 2010
    Gender
    male
    Location
    Steam: MrTricklez
    Posts
    1,723
    Reputation
    141
    Thanks
    2,913
    My Mood
    Devilish
    Quote Originally Posted by Zeraxis View Post
    Where would I even find assembly code like this on the internet? It isn't very common to code in...
    i am not saying the websites but if you google it, its all over and its basic writeproccessmemory try learning with e-books theres some on this website if you search as hard as that source you should find

  8. #22
    Zeraxis's Avatar
    Join Date
    Dec 2011
    Gender
    male
    Posts
    108
    Reputation
    10
    Thanks
    6,759
    My Mood
    Inspired
    Quote Originally Posted by jameshk67 View Post
    i am not saying the websites but if you google it, its all over and its basic writeproccessmemory try learning with e-books theres some on this website if you search as hard as that source you should find
    Okay, I guess I'll explain how all of it works then even though I'm pretty sure your just trolling. My function takes 3 arguments which are:
    Code:
    mov ebx, dword ptr [ebp+8]
    mov edx, dword ptr [ebp+0Ch]
    mov eax, dword ptr [ebp+10h]
    [ebp+8] is the first, which is the memory address
    [ebp+0Ch] is the second, which is the opcode you want to write
    [ebp+10h] is the third, which is the number of bytes what you want to write

    next you push eax, ebx, and edx onto the stack to preserve them because they get changed during the call to the VirtualProtect. After the call you pop them back off the stack.

    Next is the loop that patches the address you chose. I wrote mine with a loop so that if for example I wanted to nop out 6 bytes I could do it in one call. The loop first uses an xor ecx, ecx to set ecx to 0, which will act as our counter for the loop. Then it uses a mov to write the opcode into the address.
    Code:
    mov byte ptr [ebx+ecx], dl
    ebx is the address that we passed in and ecx is the counter that uses inc to increase by one every time it goes through the loop. edx is the byte we wanted to write, but because this is a 1 byte patch we need to use the 8 bit part of edx which is dl.

    Next we compare ecx and eax with cmp ecx, eax. eax is the number of bytes we passed in. So, it checks if we have written enough bytes to exit our loop. If not, it jumps back up to the label called patch. If it is it restores the old protection with another call to VirtualProtect and then exits the function.

    There, are you happy now?

  9. #23
    xZomeEcx3's Avatar
    Join Date
    Mar 2013
    Gender
    male
    Posts
    3
    Reputation
    10
    Thanks
    0
    Where is the injector??!!

  10. #24
    Zeraxis's Avatar
    Join Date
    Dec 2011
    Gender
    male
    Posts
    108
    Reputation
    10
    Thanks
    6,759
    My Mood
    Inspired
    Quote Originally Posted by xZomeEcx3 View Post
    Where is the injector??!!
    Jorndel posted a link to one.
    Last edited by Zeraxis; 03-23-2013 at 09:25 PM.

  11. #25
    MaRvAWAKE's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    7
    Reputation
    10
    Thanks
    0
    It does work thanks

  12. #26
    Tacioto's Avatar
    Join Date
    Sep 2011
    Gender
    male
    Posts
    269
    Reputation
    13
    Thanks
    35
    My Mood
    Twisted
    is this undetected then?

  13. #27
    Zeraxis's Avatar
    Join Date
    Dec 2011
    Gender
    male
    Posts
    108
    Reputation
    10
    Thanks
    6,759
    My Mood
    Inspired
    Quote Originally Posted by Tacioto View Post
    is this undetected then?
    Yep

  14. #28
    Vehrdyn's Avatar
    Join Date
    Apr 2011
    Gender
    male
    Location
    House of house
    Posts
    8,543
    Reputation
    206
    Thanks
    5,531
    Nice work

  15. #29
    n4chos's Avatar
    Join Date
    Mar 2013
    Gender
    male
    Posts
    15
    Reputation
    10
    Thanks
    0
    im sorry! didnt want to

    ---------- Post added at 10:41 AM ---------- Previous post was at 10:14 AM ----------

    i get kicked on pb servers..corrupted memory/codhook
    Last edited by n4chos; 03-25-2013 at 10:16 AM. Reason: posted in a wrong page

  16. #30
    megadeath000's Avatar
    Join Date
    Mar 2013
    Gender
    female
    Posts
    2
    Reputation
    10
    Thanks
    0
    i got a problem when i inject this dll using that injector, it hangs-up in the beginning of the game.

Page 2 of 3 FirstFirst 123 LastLast

Similar Threads

  1. [Release] CoD4 Multihack + Aimbot
    By Blacklyte in forum Call of Duty 4 - Modern Warfare (MW) Hacks
    Replies: 13
    Last Post: 04-30-2010, 09:46 PM
  2. New COD4:: MULTIHACK/AIMBOT
    By Crazyfella in forum Call of Duty 4 - Modern Warfare (MW) Hacks
    Replies: 33
    Last Post: 01-15-2010, 02:16 PM
  3. [Release] CoD4 Multihack
    By themaker222 in forum Call of Duty 4 - Modern Warfare (MW) Hacks
    Replies: 2
    Last Post: 12-07-2009, 01:56 PM
  4. H3hes COD4 MultiHack V3
    By kenaru in forum Call of Duty 4 - Modern Warfare (MW) Hacks
    Replies: 113
    Last Post: 09-20-2009, 07:37 AM
  5. CoD4 Multihack + Chams
    By x44 in forum Call of Duty 4 - Modern Warfare (MW) Hacks
    Replies: 34
    Last Post: 03-10-2009, 02:55 PM

Tags for this Thread