Injecting commands

Started by EightyVice, Jun 09, 2017, 12:02 AM

Previous topic - Next topic

EK.IceFlake

Quote from: . on Jun 14, 2017, 06:38 PMWell, in that case we're indeed talking about bots. So we really do need to get into ethics because... cheating. Regardless of how you look at it, that information leads straight to cheating. Definitely not you, I mean, you probably won't get any further than copying that example. Let alone compiling it, injecting it and maintaining it (updating offsets and adjusting for changes after each update).

At which point this topic does (or will) represent an "issue" to the developers. No matter how nice and OK they seem to be with it now. We're going to reach that point where they'll need deal with it in a less than friendly manner.
While the developers do the exact same thing all day long (<<< exaggerated), right?

EightyVice

#31
ok there is small script to set  the health value into 100
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048)
label(returnhere)
label(originalcode)
label(exit)

newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov [edx],#100
originalcode:
//mov [edx],ax
mov eax,[esi+0000111C]

exit:
jmp returnhere

"duke_base.dll"+793A3:
jmp newmem
nop
nop
nop
nop
returnhere:


 
 
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"duke_base.dll"+793A3:
mov [edx],ax
mov eax,[esi+0000111C]
//Alt: db 66 89 02 8B 86 1C 11 00 00
Where is the offsets and addresses? are the offsets is 793A3?

EightyVice

sorry for double post it a server timeout problem

EK.IceFlake

Quote from: Zeyad Ahmed on Jun 16, 2017, 05:58 AMok there is small script to set  the health value into 100
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048)
label(returnhere)
label(originalcode)
label(exit)

newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov [edx],#100
originalcode:
//mov [edx],ax
mov eax,[esi+0000111C]

exit:
jmp returnhere

"duke_base.dll"+793A3:
jmp newmem
nop
nop
nop
nop
returnhere:


 
 
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"duke_base.dll"+793A3:
mov [edx],ax
mov eax,[esi+0000111C]
//Alt: db 66 89 02 8B 86 1C 11 00 00
Where is the offsets and addresses? are the offsets is 793A3?
Quote from: . on Jun 14, 2017, 06:38 PMDefinitely not you, I mean, you probably won't get any further than copying that example. Let alone compiling it, injecting it and maintaining it (updating offsets and adjusting for changes after each update).

EightyVice

Quote from: EK.IceFlake on Jun 16, 2017, 07:41 AM
Quote from: Zeyad Ahmed on Jun 16, 2017, 05:58 AMok there is small script to set  the health value into 100
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048)
label(returnhere)
label(originalcode)
label(exit)

newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov [edx],#100
originalcode:
//mov [edx],ax
mov eax,[esi+0000111C]

exit:
jmp returnhere

"duke_base.dll"+793A3:
jmp newmem
nop
nop
nop
nop
returnhere:


 
 
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"duke_base.dll"+793A3:
mov [edx],ax
mov eax,[esi+0000111C]
//Alt: db 66 89 02 8B 86 1C 11 00 00
Where is the offsets and addresses? are the offsets is 793A3?
Quote from: . on Jun 14, 2017, 06:38 PMDefinitely not you, I mean, you probably won't get any further than copying that example. Let alone compiling it, injecting it and maintaining it (updating offsets and adjusting for changes after each update).
i didnt understand?! what SLC means?

EK.IceFlake

Quote from: Zeyad Ahmed on Jun 16, 2017, 07:52 AM
Quote from: EK.IceFlake on Jun 16, 2017, 07:41 AM
Quote from: Zeyad Ahmed on Jun 16, 2017, 05:58 AMok there is small script to set  the health value into 100
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048)
label(returnhere)
label(originalcode)
label(exit)

newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov [edx],#100
originalcode:
//mov [edx],ax
mov eax,[esi+0000111C]

exit:
jmp returnhere

"duke_base.dll"+793A3:
jmp newmem
nop
nop
nop
nop
returnhere:


 
 
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"duke_base.dll"+793A3:
mov [edx],ax
mov eax,[esi+0000111C]
//Alt: db 66 89 02 8B 86 1C 11 00 00
Where is the offsets and addresses? are the offsets is 793A3?
Quote from: . on Jun 14, 2017, 06:38 PMDefinitely not you, I mean, you probably won't get any further than copying that example. Let alone compiling it, injecting it and maintaining it (updating offsets and adjusting for changes after each update).
i didnt understand?! what SLC means?
The potential hacker thing doesn't apply to you because all you can do is copy it. You will not be able to progress any further.

EightyVice

Quote from: EK.IceFlake on Jun 16, 2017, 11:00 AM
Quote from: Zeyad Ahmed on Jun 16, 2017, 07:52 AM
Quote from: EK.IceFlake on Jun 16, 2017, 07:41 AM
Quote from: Zeyad Ahmed on Jun 16, 2017, 05:58 AMok there is small script to set  the health value into 100
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048)
label(returnhere)
label(originalcode)
label(exit)

newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov [edx],#100
originalcode:
//mov [edx],ax
mov eax,[esi+0000111C]

exit:
jmp returnhere

"duke_base.dll"+793A3:
jmp newmem
nop
nop
nop
nop
returnhere:


 
 
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"duke_base.dll"+793A3:
mov [edx],ax
mov eax,[esi+0000111C]
//Alt: db 66 89 02 8B 86 1C 11 00 00
Where is the offsets and addresses? are the offsets is 793A3?
Quote from: . on Jun 14, 2017, 06:38 PMDefinitely not you, I mean, you probably won't get any further than copying that example. Let alone compiling it, injecting it and maintaining it (updating offsets and adjusting for changes after each update).
i didnt understand?! what SLC means?
The potential hacker thing doesn't apply to you because all you can do is copy it. You will not be able to progress any further.
he means that i will not understand? maybe i can improve the example?
i came her for an answer!