IamNosa How do I cheat? Reputation: 0
Joined: 02 Apr 2021 Posts: 3 Location: dk
|
Posted: Fri Apr 02, 2021 7:45 am Post subject: AOB offset and bytes asserted |
|
|
i dont know to use these but i know i need them i need the offset bcause that aob is two more then i am going to edit and as for the bytes aserted i dont even know what that does. i just want figuring out how aob offset script is like made you know how to works, and yes this is the turtorial but its not telling me how to code that offset or the other thing
[/code]
define(step8WrtBytes, D9 5F 30 83 EC 0C 68)
////
//// ------------------------------ ENABLE ------------------------------
[ENABLE]
//aobScanModule(aobStep8WrtHook, Tutorial-i386.exe, 8Bxxxx89xxxx8Bxxxx8Bxxxx8DxxxxE8xxxxxxxx8Bxxxx8Bxxxx8Bxxxxxxxxxx)
//// or with aobScan
aobScan(aobStep8WrtHook, D95F3083EC0C68xxxxxxxxE8xxxxxxxx83C4100FB605F23Exxxx85C00F84C9000000)
define(injStep8WrtHook, aobStep8WrtHook+3)
//// Here the offset is set, to be used for enabling and disabling. <-- i dont know what to put here
assert(injStep8WrtHook, step8WrtBytes)
//// Here the bytes are asserted to be compatable with the process version. <-- dont know about this aither
registerSymbol(injStep8WrtHook)
alloc(memStep8WrtHook, 0x400, injStep8WrtHook)
//...
////
//// ---------- Injection Point ----------
newmem:
code:
fstp dword ptr [edi+30]
sub esp,0C
jmp return
INJECT:
jmp newmem
nop
return:
////
//// ------------------------------ DISABLE ------------------------------
[DISABLE]
////
//// ---------- Injection Point ----------
injStep8WrtHook:
db step8WrtBytes
unregisterSymbol(injStep8WrtHook)
unregisterSymbol(ptrStep8WrtHook)
dealloc(memStep8WrtHook)
|
|