you can find it just look at the topics !
Hey; its been a couple months sense I had last logged on here.
Just wondering how we bypass WarRock for memory editing now. I was working on a bypass awhile ago, but then I got a new full-time job, and forget everything that I worked on.
If someone could just post if its public; or if private, then contact me privately. It would help alot.
Thanks
-Marneus901
you can find it just look at the topics !
Last edited by IIDracula; 07-29-2008 at 11:21 PM.
a) Scan Redirection
b) "Turn off hack before scanning" which is idiotic
c) Patch md5 in strings before output encryption
d) Handle all data sent through sendto
e) Handle all data sent through _vsnprintf
f) Do VEH/SEH on data when it gets scanned and return X, Y, or Z for data
g) Redirect function calls of the game itself
h) Forge the entire client, and handle everything (Global PB hack really)Something you should try out, credits to uNrEaL. I think I may also try this, I'll contact you if I get anything readyScan1: Base + 0x40276
Scan2: Base + 0x21C1
E: Yeah, and I think for a start I'm gonna try it with patching those pbcl calls. It seems easy enough
Something what you should look at, still not working properlyCode:void __declspec( naked ) new_pbMemScan ( int a1 ,int a2 ) { _asm { MOV dwSaved, EAX // Preserve EAX POP EAX // POP EAX, now EAX contains the return address MOV dwReturn, EAX // Sets dwReturn to hold the return address CALL ReStore // Restore Hacks MOV EAX, dwSaved // Restores EAX to the origional value before we popped it JMP dwReturn // We jump back to the address which we saved earlier } }
credits to *** cobra
And no, there is no topics at MPGH about bypassing after you left
You got Xfire?
Last edited by juppeli; 07-30-2008 at 02:51 AM.
no there isn't. this is private knowledge.
hey add me on MSN:
olie122333@dutchonline****************
or xfire:
olie122333
I will teach you (AND ONLY YOU) how to bypass.
NO ONE ELSE CONTACT ME THROUGH THIS OR THE PM SYSTEM ASKING TO KNOW HOW, OR I WILL REPORT YOU FOR HURASSMENT!
Yea i got XFire - marneus901
But dont you still have my MSN? I jsut forget whos who in over 1,000 contacts adding me >_<
And yea, figured nothing popped up T.T
When i left, i remember leaving with knowing that there were 2 PBCheck functions, one was the original one, and another that also checked that one...
Ive been working on antihack security for LegendGamers Gunz, and an XTRAP Bypass for iGunz (SO DAM CLOSE TOO!). I am almost able to login, but a weird window popsup ;p
@ oli122333, i added you via both xfire and MSN.
Yeah I do but I prefer Xfire over MSN (I added yo btw). Yep there was at least 2 functions, and punkbuster updated and PB_P method won't work anymore. With this call technique, as I understood it, there is no need to patch the check that checks the check. But lets continue in private so those punkbuster fagots won't find out
KEEP IT SECRET!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
omfg, every who can use a disassembler can bypass pb
kino1234 (08-07-2008)
Gordon, stfu. You cant even use my GetByte function correctly, so how can you use OllyDBG correctly? >_>
@Olie
And NOP? That just sounds so simple. Ide like to see how, then try another way... NOP is so old to me LOL =P
But yea, pulling an all nighter tonight, gf's coming over tommorrow night, so ill be on for a couple hours to catch ya.
LOL ive tried bypassing PB once using detours; i go in blindly, and i do make a good hook, just didnt have the correct scan function, well at the time, it was private (meaning no one knew were the new function is). Im 18, got a full-time job. Had to focus on that rather than PB. Its been awhile, dunno how PB evolved. So yea, stfu like i said.
@juppeli
if PB is really that stupid, then ill cut myself. XTRAP is alot harder to bypass then PB if thats all it takes... >_>
Last edited by *Marneus901*; 08-01-2008 at 01:11 PM.
im using 1 jmp detour to bypass pb. also im using the string patch methode. the problem is you have to find the function where the full string is stored. hook it and patch the strings
took about 2(?) hours