Page 3 of 5
Re: Tracing Hex Strings through Disassembly
Posted: 18 Aug 2008, 11:27
by sli
Newer clients don't JMP the same as older ones (well, it's contained in another location, anyway). This guide is way out of date. Hacking an RO client is getting more and more difficult, it seems. I removed two CALLs from mine and it caused crashes even though there was nothing important removed and the stack remained pristine (didn't remove the ADD esp, 8).
Re: Tracing Hex Strings through Disassembly
Posted: 23 Aug 2008, 04:59
by Retu
Please add an "[Outdated]" in the title of the topic
Re: Tracing Hex Strings through Disassembly
Posted: 23 Aug 2008, 08:14
by krone
For pRO players looking for working hex codes, here's the link:
http://darkmoon.ath.cx/viewtopic.php?f=7&t=380
Re: Tracing Hex Strings through Disassembly
Posted: 24 Aug 2008, 22:44
by cupid062985
i don't think it is updated as well since I can't find the hex codes mentioned and the updated links does not exist. If only somebody could give us the updated steps on how to do it.
Re: Tracing Hex Strings through Disassembly
Posted: 25 Aug 2008, 06:27
by krone
cupid062985 wrote:
i don't think it is updated as well since I can't find the hex codes mentioned and the updated links does not exist. If only somebody could give us the updated steps on how to do it.
I just used them this friday and they are all working. They are as follows:
For commercial servers:
updated: June 26, 2008 posted by Belladonna
To disable gameguard:updated: July 2, 2008 posted by makki08
Search: E8 D1 A8 E9 FF
Replace: 90 90 90 90 90
Unlimited zoom:
search : 00 00 66 43 00 00 C8 43
replace: 00 00 00 43 00 00 86 44
Multiple Window Strings:updated: July 2, 2008 posted by makki08
Search: 85 C0 74 07 C6 05 A0 F1 7A 00
Replace: 85 C0 EB 07 C6 05 A0 F1 7A 00
Search: 85 C0 74 0E 5F 5E B8 01 00 00
Replace: 85 C0 EB 0E 5F 5E B8 01 00 00
Search: 85 C0 74 09 5F 5E 32 C0 5B 8B
Replace: 85 C0 EB 09 5F 5E 32 C0 5B 8B
Source: DARKMOON pRO Support Forum
Re: Tracing Hex Strings through Disassembly
Posted: 25 Aug 2008, 06:59
by cupid062985
krone wrote:
I just used them this friday and they are all working. They are as follows:
For commercial servers:
updated: June 26, 2008 posted by Belladonna
To disable gameguard:updated: July 2, 2008 posted by makki08
Search: E8 D1 A8 E9 FF
Replace: 90 90 90 90 90
Unlimited zoom:
search : 00 00 66 43 00 00 C8 43
replace: 00 00 00 43 00 00 86 44
Multiple Window Strings:updated: July 2, 2008 posted by makki08
Search: 85 C0 74 07 C6 05 A0 F1 7A 00
Replace: 85 C0 EB 07 C6 05 A0 F1 7A 00
Search: 85 C0 74 0E 5F 5E B8 01 00 00
Replace: 85 C0 EB 0E 5F 5E B8 01 00 00
Search: 85 C0 74 09 5F 5E 32 C0 5B 8B
Replace: 85 C0 EB 09 5F 5E 32 C0 5B 8B
Source: DARKMOON pRO Support Forum
Yeah it did work... sorry i think i skipped something when i did it... it works for pRO commercial server and Valkyrie Server. I don't know with the other server... Thanks krone!
Re: Tracing Hex Strings through Disassembly
Posted: 25 Aug 2008, 13:10
by sli
If anyone's interested in a more generalized hacking process, check my post
here about my Kore-RO anti-bitch patch.
Re: Tracing Hex Strings through Disassembly
Posted: 11 Apr 2009, 21:53
by cupid062985
Hi Guys,
My friend got this step that's easy to understand (well at least for me) on how to hex your ragexe.exe. Just click
http://docs.google.com/View?docid=ddz3r ... gd=1&hl=en
Take note of the reference to last word "0rd:..." that should give you the hint that you're in the right location. =)
Enjoy!
Re: Tracing Hex Strings through Disassembly
Posted: 28 May 2009, 08:53
by eric10
elo..
can you update the hex codes..
i've tried the
multiple client windows (for older clients)
if you're using an older version of ragexe.exe, you only need to replace 2 hex values.
first, search for USER32.FindWindowA. look for the jump & take note of the value & address.
lastly, search for KERNEL32.CreateMutexA. again, look for the jump & take note of the value & address.
now open your ragexe.exe on your hex editor & go to the offsets. then change the first hex of each value to EB.
congratulations. your ragexe.exe now allows multiple client.
but it doesn't work anymore in
philippine valhalla ragnarok.. after it was patch on may 27, 2009..
i've tried to decode it again. everything i use the dual log in client, the other client
disconnects my first login.
i would like to ask for an update for this..
maraiming maraming salama po sa tulong cozzie.. sana maasahan ko ung bagong hex code for phillippine valhalla..
ty so much ..
Re: Tracing Hex Strings through Disassembly
Posted: 08 Jul 2009, 20:30
by wishingwell
i hope there's an updated version of this thread
coz some of us are willing to hex the client immediately after a server maintenance due to the fact that it's hard to wait for someone or some people to hex it
specially in the case of other servers where no one seems to hex them anymore.