Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Front Żołnierza
#1
Czy można oszukać pracę silnika w Soldier Front?   Ponieważ szukałem nazw łańcuchów takich jak:     Zacytować:       Ollydbg Cheatengine 5.2 i 5.3 kernelmoduleloader Zaawansowany system czerpania kropek mlengine.exe zidengine.exe ryuengine.exe soraengine.exe systemcallsignal.exe systemretrieve.exe SFH.exe moonlightengine.exe         Więc mogę zrobić obejście ... czy ktoś może mi pomóc ?       Kod:   BOOL g_bActive = false; BYTE g_bStringScan_Original [0x148] = {0x6F, 0x6C, 0x6C, 0x79, 0x64, 0x62, 0x67, 0x2E, 0x65, 0x78, 0x65, 0x00, 0x6D, 0x6C, 0x62, 0x2E, 0x65, 0x78, 0x65, 0x00, 0x6D, 0x6C , 0x65, 0x6E, 0x67, 0x69, 0x6E, 0x65, 0x2E, 0x65, 0x78, 0x65, 0x00, 0x00, 0x00, 0x00, 0x7A, 0x69, 0x64, 0x20, 0x65, 0x6E, 0x67, 0x69, 0x6E, 0x65, 0x2E , 0x65, 0x78, 0x65, 0x00, 0x00, 0x72, 0x79, 0x75, 0x20, 0x65, 0x6E, 0x67, 0x69, 0x6E, 0x65, 0x2E, 0x65, 0x78, 0x72, 0x00, 0x00, 0x73, 0x6F, 0x72, 0x61 0x65, 0x6E, 0x67, 0x69, 0x6E, 0x65, 0x2E, 0x65, 0x78, 0x65, 0x00, 0x00, 0x73, 0x79, 0x64, 0x31, 0x64, 0x64, 0x64 , 0x6E, 0x61 0x6C, 0x2E, 0x65, 0x78, 0x65, 0x00, 0x00, 0x00, 0x00, 0x73, 0x79, 0x73, 0x74, 0x64, 0x64, 0x72, 0x64, 0x72, 0x2E , 0x65, 0x78, 0x65, 0x00, 0x6B, 0x65, 0x72, 0x6E, 0x65, 0x6C, 0x6D, 0x6F, 0x64, 0x75, 0x6C, 0x65, 0x75, 0x6C, 0x6C, 0x6F, 0x61, 0x64, 0x65, 0x72, 0x2E , 0x65, 0x78, 0x65, 0x00, 0x00, 0x00, 0x00, 0x65, 0x6D, 0x70, 0x74, 0x79, 0x70, 0x72, 0x6F, 0x63, 0x65, 0x73, 0x73, 0x2, 0x65, 0x78, 0x00, 0x00 , 0x00, 0x00, 0x61, 0x62, 0x79, 0x73, 0x73, 0x77, 0x73, 0x2, 0x64, 0x78, 0x64, 0x6D, 0x6F, 0x6F, 0x6C, 0x6C, 0x69, 0x67, 0x68, 0x74, 0x64, 0x6E , 0x67, 0x69, 0x6E, 0x65 , 0x2E, 0x65, 0x78, 0x65, 0x00, 0x53, 0x46, 0x48, 0x2E, 0x65, 0x78, 0x65, 0x00, 0x43, 0x68, 0x65, 0x61, 0x74, 0x20, 0x64, 0x64, 0x64, 0x64 , 0x20, 0x35, 0x2E, 0x32, 0x20, 0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74, 0x00, 0x43, 0x68, 0x65, 0x61, 0x74, 0x20, 0x64, 0x67, 0x64, 0x64, 0x20 , 0x35, 0x2E, 0x32, 0x20, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x00, 0x43, 0x68, 0x65, 0x61, 0x74, 0x20, 0x64, 0x64, 0x35 , 0x2E, 0x33, 0x00, 0x00, 0x00, 0x00, 0x41, 0x64, 0x76, 0x61, 0x6E, 0x63, 0x65, 0x64, 0x20, 0x52, 0x64, 0x44, 0x72, 0x61 , 0x77, 0x69, 0x6E, 0x6 7, 0x20, 0x53, 0x79, 0x73, 0x74, 0x65, 0x6D, 0x00, 0x00, 0x49, 0x50, 0x32, 0x00, 0x73, 0x64, 0x20}; BYTE g_bStringScan_Bypass [0x148]; StringScan_Patch (DWORD * pStringScan) {for (int i = 0; i <sizeof (g_bStringScan_Original); i ++) {if (g_bStringScan_Original [i]! = 0 && g_bStringScan_Original [i]! = 0x65) {g_bStringScan_Bypass [i] = 0x78; } else {g_bStringScan_Bypass [i] = g_bStringScan_Original [i]; }} memcpy (pStringScan, g_bStringScan_Bypass, sizeof (g_bStringScan_Bypass)); g_bActive = true; } StringScan_UnPatch (DWORD * pStringScan) {memcpy (pStringScan, g_bStringScan_Original, sizeof (g_bStringScan_Original)); g_bActive = false; }   Znalazłem ten kod stworzony przez Shad0w_ aka Stickleback aka Crosshatch. i nie wiem jak mogę go zaktualizować i użyć XD .. Prosimy o pomoc.
Reply
#2
- może możesz to zrobić. - bardzo szybko .
Reply
#3
Zacytować: Napisał pierwotnie Musivian - może możesz to zrobić. - bardzo szybko . Możesz mi pomóc ? XD !!
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)