Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 42

Hybrid View

  1. #1
    Shion1425's Avatar
    Join Date
    Mar 2013
    Gender
    male
    Posts
    39
    Reputation
    10
    Thanks
    1
    I try this thing.

  2. #2
    mildredcoston's Avatar
    Join Date
    Mar 2013
    Gender
    male
    Posts
    7
    Reputation
    10
    Thanks
    0
    I Wouldn't trust you kid.

  3. #3
    CFHackerExtreme's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Location
    Germany
    Posts
    245
    Reputation
    10
    Thanks
    561
    My Mood
    Yeehaw
    Quote Originally Posted by pceumel View Post
    Originally Posted by CFHackerExtreme
    PCe, why you Post This?
    Bec. its funny to see all the people asking what it is ^^
    Nice PCe, Nice

  4. #4
    Royku's Avatar
    Join Date
    May 2010
    Gender
    male
    Location
    G-Force.dll
    Posts
    3,015
    Reputation
    381
    Thanks
    3,308
    My Mood
    Devilish
    This use your Grapich card right?
    i heard if you do something wrong you can fuck up your card.. lol
    why dont you just make a mid function hook or w/e xD

  5. #5
    XarutoUsoCrack's Avatar
    Join Date
    Apr 2011
    Gender
    male
    Location
    CFAL Honra & Glória Server
    Posts
    1,087
    Reputation
    51
    Thanks
    2,546
    My Mood
    Relaxed
    This is detected since 2011, and i can proof that cuz i tested this and gave me Xtrap Abnormal Error.

  6. #6
    pceumel's Avatar
    Join Date
    Apr 2011
    Gender
    male
    Posts
    335
    Reputation
    16
    Thanks
    2,605
    My Mood
    Yeehaw
    Quote Originally Posted by XarutoUsoCrack View Post
    This is detected since 2011, and i can proof that cuz i tested this and gave me Xtrap Abnormal Error.
    xtrap doesn't detect it ..
    I use this hook! - win 7- 64 home prem.
    Only part which is "detected" is the TerminateThread .. Just sign it :P

    ---------- Post added at 06:35 AM ---------- Previous post was at 06:33 AM ----------

    Quote Originally Posted by Royku View Post
    This use your Grapich card right?
    i heard if you do something wrong you can fuck up your card.. lol
    why dont you just make a mid function hook or w/e xD
    Yes Graphic card driver - ring03 .. i hate mid and a wddm hook works for all d3d versions :P
    my card is still ok..
    NEW - D3D BASE -WDDM HOOK
    https://www.mpgh.net/forum/242-crossf...ml#post7906339
    My Base and Injector source (HOTKEY):
    https://www.mpgh.net/forum/580-crossf...ml#post5927406

    Happy leeching
    WDDM Hook
    https://www.mpgh.net/forum/242-crossf...d-hooking.html


    Killed a GM with hack : DONE and no bann ^^
    Killed a GM and all other Players : DONE
    Get 3min Banned : Done

  7. #7
    Ende!'s Avatar
    Join Date
    Feb 2010
    Gender
    male
    Posts
    33
    Reputation
    10
    Thanks
    33
    Quote Originally Posted by pceumel View Post
    xtrap doesn't detect it ..
    I use this hook! - win 7- 64 home prem.
    Only part which is "detected" is the TerminateThread .. Just sign it :P
    Code:
    .text:4041D8D0 ; =============== S U B R O U T I N E =======================================
    .text:4041D8D0
    .text:4041D8D0
    .text:4041D8D0 sub_4041D8D0    proc near               ; CODE XREF: sub_4041C9F0+2Dp
    .text:4041D8D0                 push    esi
    .text:4041D8D1                 mov     esi, ecx
    .text:4041D8D3                 push    offset aAticfx32_dll ; "Aticfx32.dll"
    .text:4041D8D8                 call    LoadLibrary
    .text:4041D8DE                 test    eax, eax
    .text:4041D8E0                 jz      short loc_4041D909
    .text:4041D8E2                 push    offset aOpenadapter ; "OpenAdapter"
    .text:4041D8E7                 push    eax             ; hLibrary
    .text:4041D8E8                 call    GetProcAddress_1
    .text:4041D8EE                 test    eax, eax
    .text:4041D8F0                 mov     pOpenAdapter, eax
    .text:4041D8F5                 jz      short loc_4041D909
    .text:4041D8F7                 push    5
    .text:4041D8F9                 add     esi, 210h
    .text:4041D8FF                 push    eax
    .text:4041D900                 push    esi
    .text:4041D901                 call    sub_4042F9D0
    .text:4041D906                 add     esp, 0Ch
    .text:4041D909
    .text:4041D909 loc_4041D909:                           ; CODE XREF: sub_4041D8D0+10j
    .text:4041D909                                         ; sub_4041D8D0+25j
    .text:4041D909                 pop     esi
    .text:4041D90A                 retn
    .text:4041D90A sub_4041D8D0    endp
    .text:4041D90A
    .text:4041D90A ; ---------------------------------------------------------------------------
    .text:4041D90B                 align 10h
    .text:4041D910
    .text:4041D910 ; =============== S U B R O U T I N E =======================================
    .text:4041D910
    .text:4041D910
    .text:4041D910 sub_4041D910    proc near               ; CODE XREF: sub_4041C9F0+26p
    .text:4041D910                 push    esi
    .text:4041D911                 mov     esi, ecx
    .text:4041D913                 push    offset aNvd3dum_dll ; "Nvd3dum.DLL"
    .text:4041D918                 call    LoadLibrary
    .text:4041D91E                 test    eax, eax
    .text:4041D920                 jz      short loc_4041D949
    .text:4041D922                 push    offset aOpenadapter ; "OpenAdapter"
    .text:4041D927                 push    eax             ; hLibrary
    .text:4041D928                 call    GetProcAddress_1
    .text:4041D92E                 test    eax, eax
    .text:4041D930                 mov     dword_40540720, eax
    .text:4041D935                 jz      short loc_4041D949
    .text:4041D937                 push    5
    .text:4041D939                 add     esi, 1FCh
    .text:4041D93F                 push    eax
    .text:4041D940                 push    esi
    .text:4041D941                 call    sub_4042F9D0
    .text:4041D946                 add     esp, 0Ch
    .text:4041D949
    .text:4041D949 loc_4041D949:                           ; CODE XREF: sub_4041D910+10j
    .text:4041D949                                         ; sub_4041D910+25j
    .text:4041D949                 pop     esi
    .text:4041D94A                 retn
    .text:4041D94A sub_4041D910    endp
    .text:4041D94A
    .text:4041D94A ; ---------------------------------------------------------------------------
    .text:4041D94B                 align 10h
    Just a small quote from an IDB file of XTrapVA.dll I created ~Nov.12 (with cleaned Themida IAT calls and reconstructed custom XT import table). Didn't perform further analysis, however they obviously do 'something' with it. The sub_XX call is the function they use to obfuscate their pointers which are put into a special structure to hold them all. I'm significantly too lazy to find the references to see what they are doing with it right now.

    Oh by the way, that image came into mind when I reopened the IDB again. Probably nobody except ~FALLEN~ will understand it, but whatever, I'll post it anyway.

  8. The Following User Says Thank You to Ende! For This Useful Post:

    ~FALLEN~ (03-13-2013)

  9. #8
    derh.acker's Avatar
    Join Date
    Aug 2010
    Gender
    male
    Location
    localhost
    Posts
    826
    Reputation
    14
    Thanks
    616
    My Mood
    Angelic
    Quote Originally Posted by Ende! View Post


    Interesting..
    Code:
    404193A2  |. 8B1D 08605040  MOV EBX,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    
    404193B0  |. 68 10DD5140    PUSH XTrapVa.4051DD10                    ; /ProcNameOrOrdinal = "GetProcAddress"
    404193B5  |. 56             PUSH ESI                                 ; |hModule
    
    404193BB  |. FFD3           CALL EBX                                 ; \GetProcAddress
    
    404193C3  |. A3 C4A45440    MOV DWORD PTR DS:[4054A4C4],EAX

    They were totally bored.

    Code:
    4041D151  |. 8B3D 08605040  MOV EDI,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    4041D157  |. 68 FCF15140    PUSH XTrapVa.4051F1FC                    ; /ProcNameOrOrdinal = "NetUserGetInfo"
    4041D15C  |. 56             PUSH ESI                                 ; |hModule
    4041D15D  |. FFD7           CALL EDI                                 ; \GetProcAddress
    Code:
    40419293  |. 68 E4DC5140    PUSH XTrapVa.4051DCE4                    ; /ProcNameOrOrdinal = "Process32First"
    40419298  |. 56             PUSH ESI                                 ; |hModule
    40419299  |. A3 8CA45440    MOV DWORD PTR DS:[4054A48C],EAX          ; |
    4041929E  |. FF15 C4A45440  CALL DWORD PTR DS:[4054A4C4]             ; \GetProcAddress
    Last edited by derh.acker; 03-08-2013 at 11:16 AM.

  10. #9
    XarutoUsoCrack's Avatar
    Join Date
    Apr 2011
    Gender
    male
    Location
    CFAL Honra & Glória Server
    Posts
    1,087
    Reputation
    51
    Thanks
    2,546
    My Mood
    Relaxed
    Quote Originally Posted by derh.acker View Post


    Interesting..
    Code:
    404193A2  |. 8B1D 08605040  MOV EBX,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    
    404193B0  |. 68 10DD5140    PUSH XTrapVa.4051DD10                    ; /ProcNameOrOrdinal = "GetProcAddress"
    404193B5  |. 56             PUSH ESI                                 ; |hModule
    
    404193BB  |. FFD3           CALL EBX                                 ; \GetProcAddress
    
    404193C3  |. A3 C4A45440    MOV DWORD PTR DS:[4054A4C4],EAX

    They were totally bored.

    Code:
    4041D151  |. 8B3D 08605040  MOV EDI,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    4041D157  |. 68 FCF15140    PUSH XTrapVa.4051F1FC                    ; /ProcNameOrOrdinal = "NetUserGetInfo"
    4041D15C  |. 56             PUSH ESI                                 ; |hModule
    4041D15D  |. FFD7           CALL EDI                                 ; \GetProcAddress
    Code:
    40419293  |. 68 E4DC5140    PUSH XTrapVa.4051DCE4                    ; /ProcNameOrOrdinal = "Process32First"
    40419298  |. 56             PUSH ESI                                 ; |hModule
    40419299  |. A3 8CA45440    MOV DWORD PTR DS:[4054A48C],EAX          ; |
    4041929E  |. FF15 C4A45440  CALL DWORD PTR DS:[4054A4C4]             ; \GetProcAddress
    They Actually Checking your Adapter to Check if have any Mem Modify.

    They use totally a Unprofessional way to check their things, xtrap is crappy already said that.

  11. #10
    Ende!'s Avatar
    Join Date
    Feb 2010
    Gender
    male
    Posts
    33
    Reputation
    10
    Thanks
    33
    Quote Originally Posted by derh.acker View Post


    Interesting..
    Code:
    404193A2  |. 8B1D 08605040  MOV EBX,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    
    404193B0  |. 68 10DD5140    PUSH XTrapVa.4051DD10                    ; /ProcNameOrOrdinal = "GetProcAddress"
    404193B5  |. 56             PUSH ESI                                 ; |hModule
    
    404193BB  |. FFD3           CALL EBX                                 ; \GetProcAddress
    
    404193C3  |. A3 C4A45440    MOV DWORD PTR DS:[4054A4C4],EAX

    They were totally bored.

    Code:
    4041D151  |. 8B3D 08605040  MOV EDI,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    4041D157  |. 68 FCF15140    PUSH XTrapVa.4051F1FC                    ; /ProcNameOrOrdinal = "NetUserGetInfo"
    4041D15C  |. 56             PUSH ESI                                 ; |hModule
    4041D15D  |. FFD7           CALL EDI                                 ; \GetProcAddress
    Code:
    40419293  |. 68 E4DC5140    PUSH XTrapVa.4051DCE4                    ; /ProcNameOrOrdinal = "Process32First"
    40419298  |. 56             PUSH ESI                                 ; |hModule
    40419299  |. A3 8CA45440    MOV DWORD PTR DS:[4054A48C],EAX          ; |
    4041929E  |. FF15 C4A45440  CALL DWORD PTR DS:[4054A4C4]             ; \GetProcAddress
    I guess you didn't really get the point. Dynamic linkage makes sense when trying to hide imports. However, dynamically linking GetProcAddress using GetProcAddress definitely doesn't as it has to be imported via IAT either way.

  12. #11
    derh.acker's Avatar
    Join Date
    Aug 2010
    Gender
    male
    Location
    localhost
    Posts
    826
    Reputation
    14
    Thanks
    616
    My Mood
    Angelic
    Quote Originally Posted by Ende! View Post
    I guess you didn't really get the point. Dynamic linkage makes sense when trying to hide imports. However, dynamically linking GetProcAddress using GetProcAddress definitely doesn't as it has to be imported via IAT either way.
    Quote Originally Posted by derh.acker View Post
    They were totally bored.
    Code:
    4041D151  |. 8B3D 08605040  MOV EDI,DWORD PTR DS:[40506008]          ;  kernel32.GetProcAddress
    4041D157  |. 68 FCF15140    PUSH XTrapVa.4051F1FC                    ; /ProcNameOrOrdinal = "NetUserGetInfo"
    4041D15C  |. 56             PUSH ESI                                 ; |hModule
    4041D15D  |. FFD7           CALL EDI                                 ; \GetProcAddress
    Code:
    40419293  |. 68 E4DC5140    PUSH XTrapVa.4051DCE4                    ; /ProcNameOrOrdinal = "Process32First"
    40419298  |. 56             PUSH ESI                                 ; |hModule
    40419299  |. A3 8CA45440    MOV DWORD PTR DS:[4054A48C],EAX          ; |
    4041929E  |. FF15 C4A45440  CALL DWORD PTR DS:[4054A4C4]             ; \GetProcAddress
    I meant that they use both the imported and non-imported GetProcAddress.

  13. #12
    ~FALLEN~'s Avatar
    Join Date
    May 2009
    Gender
    male
    Location
    devenv.exe
    Posts
    529
    Reputation
    23
    Thanks
    328
    My Mood
    Inspired
    Quote Originally Posted by Ende! View Post
    Code:
    .text:4041D8D0 ; =============== S U B R O U T I N E =======================================
    .text:4041D8D0
    .text:4041D8D0
    .text:4041D8D0 sub_4041D8D0    proc near               ; CODE XREF: sub_4041C9F0+2Dp
    .text:4041D8D0                 push    esi
    .text:4041D8D1                 mov     esi, ecx
    .text:4041D8D3                 push    offset aAticfx32_dll ; "Aticfx32.dll"
    .text:4041D8D8                 call    LoadLibrary
    .text:4041D8DE                 test    eax, eax
    .text:4041D8E0                 jz      short loc_4041D909
    .text:4041D8E2                 push    offset aOpenadapter ; "OpenAdapter"
    .text:4041D8E7                 push    eax             ; hLibrary
    .text:4041D8E8                 call    GetProcAddress_1
    .text:4041D8EE                 test    eax, eax
    .text:4041D8F0                 mov     pOpenAdapter, eax
    .text:4041D8F5                 jz      short loc_4041D909
    .text:4041D8F7                 push    5
    .text:4041D8F9                 add     esi, 210h
    .text:4041D8FF                 push    eax
    .text:4041D900                 push    esi
    .text:4041D901                 call    sub_4042F9D0
    .text:4041D906                 add     esp, 0Ch
    .text:4041D909
    .text:4041D909 loc_4041D909:                           ; CODE XREF: sub_4041D8D0+10j
    .text:4041D909                                         ; sub_4041D8D0+25j
    .text:4041D909                 pop     esi
    .text:4041D90A                 retn
    .text:4041D90A sub_4041D8D0    endp
    .text:4041D90A
    .text:4041D90A ; ---------------------------------------------------------------------------
    .text:4041D90B                 align 10h
    .text:4041D910
    .text:4041D910 ; =============== S U B R O U T I N E =======================================
    .text:4041D910
    .text:4041D910
    .text:4041D910 sub_4041D910    proc near               ; CODE XREF: sub_4041C9F0+26p
    .text:4041D910                 push    esi
    .text:4041D911                 mov     esi, ecx
    .text:4041D913                 push    offset aNvd3dum_dll ; "Nvd3dum.DLL"
    .text:4041D918                 call    LoadLibrary
    .text:4041D91E                 test    eax, eax
    .text:4041D920                 jz      short loc_4041D949
    .text:4041D922                 push    offset aOpenadapter ; "OpenAdapter"
    .text:4041D927                 push    eax             ; hLibrary
    .text:4041D928                 call    GetProcAddress_1
    .text:4041D92E                 test    eax, eax
    .text:4041D930                 mov     dword_40540720, eax
    .text:4041D935                 jz      short loc_4041D949
    .text:4041D937                 push    5
    .text:4041D939                 add     esi, 1FCh
    .text:4041D93F                 push    eax
    .text:4041D940                 push    esi
    .text:4041D941                 call    sub_4042F9D0
    .text:4041D946                 add     esp, 0Ch
    .text:4041D949
    .text:4041D949 loc_4041D949:                           ; CODE XREF: sub_4041D910+10j
    .text:4041D949                                         ; sub_4041D910+25j
    .text:4041D949                 pop     esi
    .text:4041D94A                 retn
    .text:4041D94A sub_4041D910    endp
    .text:4041D94A
    .text:4041D94A ; ---------------------------------------------------------------------------
    .text:4041D94B                 align 10h
    Just a small quote from an IDB file of XTrapVA.dll I created ~Nov.12 (with cleaned Themida IAT calls and reconstructed custom XT import table). Didn't perform further analysis, however they obviously do 'something' with it. The sub_XX call is the function they use to obfuscate their pointers which are put into a special structure to hold them all. I'm significantly too lazy to find the references to see what they are doing with it right now.

    Oh by the way, that image came into mind when I reopened the IDB again. Probably nobody except ~FALLEN~ will understand it, but whatever, I'll post it anyway.
    Made me rofl so hard.... Why not just get the address by walking the PEB to enumerate modules and then walk the import table to get the ordinal and from there get the actual address.... I guess that's too much logic for XCrap to use... smh

  14. #13
    Ende!'s Avatar
    Join Date
    Feb 2010
    Gender
    male
    Posts
    33
    Reputation
    10
    Thanks
    33
    Quote Originally Posted by ~FALLEN~ View Post
    Made me rofl so hard.... Why not just get the address by walking the PEB to enumerate modules and then walk the import table to get the ordinal and from there get the actual address.... I guess that's too much logic for XCrap to use... smh
    Do you really expect someone who implements a "detour detection" like that

    and string "encryption" using this technique

    to know about ANY windows-internals, even if they are trivial? :P

    Edit: Oh and in case of crypto-algorithms: better initialize the key multiple times, safety first.


    We should consider starting a thread to honor the glorious coding-skills of the XTrap developers - finding content to feed it definitely won't be a big deal.
    Last edited by Ende!; 03-14-2013 at 02:32 PM.

  15. The Following 2 Users Say Thank You to Ende! For This Useful Post:

    giniyat101 (03-18-2013),~FALLEN~ (03-15-2013)

  16. #14
    CrazyFrost's Avatar
    Join Date
    May 2012
    Gender
    male
    Posts
    94
    Reputation
    33
    Thanks
    935
    My Mood
    Bored
    DIPEngine work (just change some hook code), why make brainfuck with WDDM?

  17. #15
    logobalogo's Avatar
    Join Date
    Nov 2012
    Gender
    male
    Location
    Croatia
    Posts
    526
    Reputation
    10
    Thanks
    607
    My Mood
    Busy
    nice man )

Page 2 of 3 FirstFirst 123 LastLast

Similar Threads

  1. WR D3D Hook - =o - 09/21/07
    By Dave84311 in forum Hack/Release News
    Replies: 26
    Last Post: 05-16-2008, 04:01 PM
  2. WR D3D Hook - =o - 03/22/07
    By Dave84311 in forum Hack/Release News
    Replies: 14
    Last Post: 10-06-2007, 09:59 AM
  3. WR D3D Hook Updated to include Punkbuster Hardware Bypass!
    By Dave84311 in forum Hack/Release News
    Replies: 3
    Last Post: 10-05-2007, 01:33 AM
  4. WR D3D Hook - =o - 09/23/07
    By Dave84311 in forum Hack/Release News
    Replies: 3
    Last Post: 09-25-2007, 07:57 AM
  5. D3D hooking tutorial 5 i think
    By llvengancell in forum WarRock - International Hacks
    Replies: 7
    Last Post: 06-26-2007, 03:09 PM

Tags for this Thread