Okay, so I recently have gotten into hacking Black Ops. I used to code for Combat Arms, which was based of of FEAR SDK. It uses CShell.dll to store most of it's addresses. Now, could someone tell me the file I will need to dump to find the addresses for Black Ops? Like the ones you guys have been posting. Also, what engine is Black Ops made with? Third, could someone give me a working Console Command function?
Thanks, and I will do my best to contribute to the community!
Last edited by seaplusplus; 01-23-2011 at 12:27 PM.
uhm i want to tell you this
but if you inject a hack or edit memory or something you are banned in 2 weeks to 2 months
so you are making a detected hack already
if I am right
I love it when people keep their agreements /sarcasm ftw
solo hacks = no ban
mp hacks = external overlays = no bans
Black Ops also uses CShell.dll to store its addresses.
However, I believe 0x457290 is not the correct address.
Here is how to find the correct address for most COD games (example from COD4):
SendCommandToConsole:
Search for string "stoprecord" or "screenshot silent" or "quit" or "pb_sv_guidrelax".
#define OFFSET_SENDCOMMAND 0x4F9AB0Code:0046C90F 68 400E6D00 PUSH iw3mp.006D0E40 ; ASCII "screenshot silent" 0046C914 6A 00 PUSH 0 0046C916 6A 00 PUSH 0 0046C918 E8 93D10800 CALL iw3mp.004F9AB0 '<<<--- SendCommandToConsole function offset' 0046C91D 83C4 0C ADD ESP,0C
Last edited by master131; 01-23-2011 at 06:32 PM.
Donate:
BTC: 1GEny3y5tsYfw8E8A45upK6PKVAEcUDNv9
Handy Tools/Hacks:
Extreme Injector v3.7.3
A powerful and advanced injector in a simple GUI.
Can scramble DLLs on injection making them harder to detect and even make detected hacks work again!
Minion Since: 13th January 2011
Moderator Since: 6th May 2011
Global Moderator Since: 29th April 2012
Super User/Unknown Since: 23rd July 2013
'Game Hacking' Team Since: 30th July 2013
--My Art--
[Roxas - Pixel Art, WIP]
[Natsu - Drawn]
[Natsu - Coloured]
All drawings are coloured using Photoshop.
--Gifts--
[Kyle]
Last edited by seaplusplus; 01-23-2011 at 06:56 PM.
Wouldn't it be the address that is called, not the address that calls it?
I think it's 0x557F20 since I believe that is where the function resides according to your assembly output....
I don't think you looked at the example carefully.
Probably have to ask Melodia, Hell_Demon, cardoow or King-Orgy to help as I don't know enough Reverse Engineering to call myself a 'pro'.
Last edited by master131; 01-23-2011 at 07:10 PM.
Donate:
BTC: 1GEny3y5tsYfw8E8A45upK6PKVAEcUDNv9
Handy Tools/Hacks:
Extreme Injector v3.7.3
A powerful and advanced injector in a simple GUI.
Can scramble DLLs on injection making them harder to detect and even make detected hacks work again!
Minion Since: 13th January 2011
Moderator Since: 6th May 2011
Global Moderator Since: 29th April 2012
Super User/Unknown Since: 23rd July 2013
'Game Hacking' Team Since: 30th July 2013
--My Art--
[Roxas - Pixel Art, WIP]
[Natsu - Drawn]
[Natsu - Coloured]
All drawings are coloured using Photoshop.
--Gifts--
[Kyle]
Well thanks anyway! cardoow and King-Orgy said 0x5baad0 was correct...
----------------------
typedef void (*SendConsoleCommand_)(int a1, char *command);
SendConsoleCommand_ SendConsoleCommand = (SendConsoleCommand_)TheAddy;
what is a1 used for?
SendConsoleCommand(?, "cg_drawFPS 1");
Last edited by seaplusplus; 01-24-2011 at 12:44 PM.