Giriş yap
En iyi yollayıcılar
Hello EMO | ||||
EMO | ||||
eMoStyLe | ||||
BesimBICER | ||||
GameKinG | ||||
Crysis | ||||
~>!.DεvιLρяιεsт.!<~ | ||||
MeTaL | ||||
TrueCrime | ||||
djhayal3t |
Istatistikler
Toplam 203 kayıtlı kullanıcımız varSon kaydolan kullanıcımız: crayzboy76
Kullanıcılarımız toplam 1186 mesaj attılar bunda 862 konu
Arama
Sosyal yer imi
Sosyal bookmarking sitesinde Emo, Emo nedir, Emo resimleri, Emo Kıyafetleri, Emo Sözleri, Emo Oyunları, EmoTurkey, Emo Nickler, Emo Avatarları, Punk, Punk Resimleri, Punk Avatarları, Rock, Rock Resimleri, Rock Avatarları, Msn Nickleri, Msn Avatarları, Müzik adresi saklayın ve paylaşın
Sosyal bookmarking sitesinde EMO Style ForumPro - Hos Geldiniz adresi saklayın ve paylaşın
Kimler hatta?
Toplam 19 kullanıcı online :: 0 Kayıtlı, 0 Gizli ve 19 Misafir :: 2 Arama motorlarıYok
Sitede bugüne kadar en çok 217 kişi C.tesi Tem. 29, 2017 1:46 am tarihinde online oldu.
En son konular
Reklam
[1.298][Client] Stopping it from launching a site on exit
EMO Style ForumPro - Hos Geldiniz :: Online Oyunlar :: Knight Online :: Knight Online Private Serverlar :: Prosedür ve Kod Paylasımları
1 sayfadaki 1 sayfası
[1.298][Client] Stopping it from launching a site on exit
[quote name='twostars' timestamp='1297205291' post='2733']
Easy one, not sure why it was never really posted officially but here goes (pretty much a straight copy from a post I made in the old Snoxd):
What we need to do here is NOP out the call to ShellExecuteA(). You could clear out the entry in Texts_us.tbl, but that'll load explorer instead (in your client's folder). You *may* be able to NULL it out completely, but I don't recommend it - ShellExecute() still gets called regardless.
So anyway - the function has 6 arguments, as you can see in its definition from MSDN:
Which can be accounted for here:
So, if your client EXE is the same as mine (USKO 1.299), just NOP out all of those lines you see above so it looks like:
Also remember that the client EXE needs to be unpacked, or you won't see any of this.
Done. Easy!
[/quote]
Easy one, not sure why it was never really posted officially but here goes (pretty much a straight copy from a post I made in the old Snoxd):
What we need to do here is NOP out the call to ShellExecuteA(). You could clear out the entry in Texts_us.tbl, but that'll load explorer instead (in your client's folder). You *may* be able to NULL it out completely, but I don't recommend it - ShellExecute() still gets called regardless.
So anyway - the function has 6 arguments, as you can see in its definition from MSDN:
- Kod:
HINSTANCE ShellExecute(
HWND hwnd,
LPCTSTR lpOperation,
LPCTSTR lpFile,
LPCTSTR lpParameters,
LPCTSTR lpDirectory,
INT nShowCmd
);
Which can be accounted for here:
- Kod:
00646308 6A 01 PUSH 1
0064630A 53 PUSH EBX
0064630B 53 PUSH EBX
0064630C 50 PUSH EAX
0064630D 68 00646D00 PUSH 006D6400 ; ASCII "open"
00646312 53 PUSH EBX
00646313 FF15 C4326A00 CALL DWORD PTR DS:[<&shell32.ShellExecut>; shell32.ShellExecuteA
So, if your client EXE is the same as mine (USKO 1.299), just NOP out all of those lines you see above so it looks like:
- Kod:
00646308 90 NOP
00646309 90 NOP
0064630A 90 NOP
0064630B 90 NOP
0064630C 90 NOP
0064630D 90 NOP
0064630E 90 NOP
0064630F 90 NOP
00646310 90 NOP
00646311 90 NOP
00646312 90 NOP
00646313 90 NOP
00646314 90 NOP
00646315 90 NOP
00646316 90 NOP
00646317 90 NOP
00646318 90 NOP
Also remember that the client EXE needs to be unpacked, or you won't see any of this.
Done. Easy!
[/quote]
Similar topics
» Inter Client
» Paket arşivi (Ebenezer&Client)
» 1351 Server Dosyaları + Client
» [Guide] Client Based Packet Injection in Silkroad
» Client Side, Server Side, COM+, ActiveX Nedir, Ne Değildir?
» Paket arşivi (Ebenezer&Client)
» 1351 Server Dosyaları + Client
» [Guide] Client Based Packet Injection in Silkroad
» Client Side, Server Side, COM+, ActiveX Nedir, Ne Değildir?
EMO Style ForumPro - Hos Geldiniz :: Online Oyunlar :: Knight Online :: Knight Online Private Serverlar :: Prosedür ve Kod Paylasımları
1 sayfadaki 1 sayfası
Bu forumun müsaadesi var:
Bu forumdaki mesajlara cevap veremezsiniz
Cuma Ağus. 29, 2014 8:33 am tarafından Hello EMO
» goldenchase.net maden yaparak para kazanma
Cuma Ağus. 29, 2014 8:18 am tarafından Hello EMO
» etichal hacker görsel egitim seti
Çarş. Ağus. 06, 2014 4:57 am tarafından Hello EMO
» KO TBL Source C#
Ptsi Ara. 09, 2013 6:36 am tarafından Hello EMO
» x86 Registers
C.tesi Ağus. 24, 2013 5:02 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de WYD
Çarş. Tem. 10, 2013 7:25 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de CS Metodo²
Çarş. Tem. 10, 2013 7:23 am tarafından Hello EMO
» [Tutorial] Aprendendo basico deASM OLLYDBG
Çarş. Tem. 10, 2013 7:22 am tarafından Hello EMO
» Basic C# DLL injector
Ptsi Tem. 08, 2013 7:48 am tarafından Hello EMO