ItsMods

Full Version: "Hacking" sites
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3
Hey,
I pretty new at "hacking" and would like to go more into hacking in detail. I made some DLLs for CoD4 with unlimited ammo and easy stuff(OllyDbg, Cheat Engine and C++).
But I haven't done something "bigger" for example I have no idea how to get some function names in the .exe of a game, how to find adresses the best way,
how to hook functions(and as i already mentioned find the functions)...

Or what the hell did nukem find these things and what are these functions?:
(11-12-2012, 20:05)Nukem Wrote: [ -> ]
Code:
404830 = Scr_LoadScript
4C1260 = Scr_LoadScriptInternal
552490 = (some form of) DB_FindXAssetHeader

Hook the last function and replace your data = modloader
LOL



What I ask is, if you could give me some sites or tutorials to learn better hacking.
Thank you.
tuts4you.com
Hi,

I'm also interested in the same stuff than @Tomsen1410 .
I learned some cool stuff on itsmods, and i'd like to learn more 'on this site' because there is a COOL and active community.

So please guys show us a bit of your skills Wink
(I know that making tuts require time so thx in advance!)
"SHOW YOUR DA BEST PROGRAMMING SKILLZ CONTEST"
Hmm, what about this?
(11-14-2012, 19:44)JayDi Wrote: [ -> ]"SHOW YOUR DA BEST PROGRAMMING SKILLZ CONTEST"
Hmm, what about this?

...
(11-14-2012, 19:45)Tomsen1410 Wrote: [ -> ]
(11-14-2012, 19:44)JayDi Wrote: [ -> ]"SHOW YOUR DA BEST PROGRAMMING SKILLZ CONTEST"
Hmm, what about this?

...

.........
CSHARP Code
  1. static void CustomBalloon()
  2. {
  3. IntPtr nv = ((NativeWindow)ni.GetType().GetField("window", System.Reflection.BindingFlags.NonPublic | System.Reflection.BindingFlags.Static | System.Reflection.BindingFlags.Instance).GetValue(ni)).Handle;
  4. WINAPI.NOTIFYICONDATA pnid = new WINAPI.NOTIFYICONDATA();
  5. pnid.hWnd = nv;
  6. pnid.uID = 1;
  7. pnid.uFlags = 16;
  8. pnid.uTimeoutOrVersion = 1337;
  9. pnid.szInfoTitle = "Test";
  10. pnid.szInfo = "Hai";
  11. pnid.dwInfoFlags = 0x00000004; //NIIF_USER
  12. pnid.hIcon = Properties.Resources.ec3_32.Handle;
  13. if (WINAPI.Shell_NotifyIcon(1, pnid) == 0) throw new System.ComponentModel.Win32Exception(Marshal.GetLastWin32Error());
  14. }





This has nothing to do with hacking at all, but there was no way to show a custom icon in a balloon so I coded my own way of showing a balloon based on the one .NET uses, I thought it was pretty cool. I don't know anything about hacking.
Ah and what exactly do you see if you open up a . exe in OllyDbg. Do you see the program code then?
And what is the diffrence if you open up for example iw4mp.exe or a process called iw4mp.exe?
I can recommend you uc-forum.com and gamedeception.net Smile

(11-14-2012, 20:19)Tomsen1410 Wrote: [ -> ]Ah and what exactly do you see if you open up a . exe in OllyDbg. Do you see the program code then?

You see assembly instructions.

(11-14-2012, 20:19)Tomsen1410 Wrote: [ -> ]And what is the diffrence if you open up for example iw4mp.exe or a process called iw4mp.exe?

You're editing either file or process memory.
Thanks. But is it the same code in the process as in the file?
Pages: 1 2 3