 |
Cheat Engine The Official Site of Cheat Engine
|
| View previous topic :: View next topic |
| Author |
Message |
Gwinx Advanced Cheater
Reputation: 0
Joined: 30 Jul 2010 Posts: 65
|
Posted: Wed Jan 09, 2013 1:26 pm Post subject: [Help]Can't find base address in OllyDbg!! |
|
|
I am trying to make an instant respawn hack atm. However, I can't find the base address. I can see that it has 3 offsets (i think...): 0x211AC, 0x211B0, and 0x211B4.
Please help (don't just give answer - please explain: how and why). Thank you
|
|
| Back to top |
|
 |
Fresco Grandmaster Cheater
Reputation: 4
Joined: 07 Nov 2010 Posts: 600
|
|
| Back to top |
|
 |
Gwinx Advanced Cheater
Reputation: 0
Joined: 30 Jul 2010 Posts: 65
|
Posted: Thu Jan 10, 2013 9:49 pm Post subject: |
|
|
| Fresco wrote: | humm those seem to me like 3 different addresses (poz X, Y and Z)
my guess o that you should use cheat engine to find a pointer, it easier and ppl will help you more cuz thy know how to use it.
anyways, yes, i think the 3 offsets you mentioned are the first offset of poz X, Y and Z.
try with cheat engine, and also try the tutorial, well talk after that
happy gamehacking. |
Thanks for the tip regarding the offsets. I would use CE if it wasn't detected. :/ What should I do now? Is there another alternative way of getting the pointer?
|
|
| Back to top |
|
 |
Fresco Grandmaster Cheater
Reputation: 4
Joined: 07 Nov 2010 Posts: 600
|
Posted: Sat Jan 12, 2013 8:26 am Post subject: |
|
|
yes, use olly, but it's a little bit more complicated for you if you don't know any assembly language.
you need to find what addresses those 3 instructions accesses or write on.
in assembly language everything between square brackets [] is referred to as a 4bytes address in virtual memory.
so, | Code: | mov [eax],3
eax=abc123fe | , would place 3 at address abc123fe and would not modify eax.
you have 3 mov's there and 3 unique memory addresses which i believe are the position of the player X, Y and Z
| Code: | MOV DWORD PTR DS:[ESI+211AC],EAX //X
MOV DWORD PTR DS:[ESI+211B0],EBX //Y
MOV DWORD PTR DS:[ESI+211B4],EBX //Z |
you need to place a breakpoint at the first mov, calculate how much [ESI+211AC] and then browse that memory location (hex dump), after that, right click the memory location and breakpoint on memory access, find out the code that accesses not writes that address, then you look at that code and figure the base address.
ex: ebx is base and 8 is offset
with ce unattached to the process search in 4 bytes hex the val of ebx and pick a random address that does not change it's value.
click add address manually, pointer, in address field write the address that you picked from ce search, add the offset and see if it points to the correct address ->[ESI+211AC], if so, go in olly and in hex dump go to that addrtess (the one that you picked from ce results) and repeat the procedure just like you did with ESI+211AC address, do that till you find a green address, once is done, you have the pointer for X, add a new address for Y and Z and add 4 to the last offset for each.
X 211AC +4
Y 211B0 +4
Z 211B4 ...
_________________
... Fresco |
|
| Back to top |
|
 |
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum
|
|