[Release]WoW 2.4.1 Addresses menu

User Tag List

Page 3 of 6 FirstFirst 123456 LastLast
Results 31 to 45 of 84
  1. #31
    unknow2k's Avatar Member
    Reputation
    7
    Join Date
    Mar 2008
    Posts
    5
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Target/Range Hack for 2.4.1

    1. login wow
    2. use memory editor ( CE or etc...) goto address and replace code:

    0054fecf c2,04,00,cc,cc,cc -> c6,07,39,c2,04,00

    3. back to wow , in chat input box , type :

    /console SET CombatLogRangeHostilePlayers "49"
    /console SET CombatLogRangeCreature "49"
    /console SET targetNearestDistance "49"
    /console SET targetNearestDistanceRadius "49"

    4. hack active!! max range -> 99 ft

    [Release]WoW 2.4.1 Addresses
  2. #32
    Forb1d's Avatar Member
    Reputation
    10
    Join Date
    Dec 2006
    Posts
    57
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Good stuff, I got mine working.

  3. #33
    deadca7's Avatar Elite User
    Reputation
    461
    Join Date
    Nov 2007
    Posts
    150
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by unknow2k View Post
    code address:

    005a8bad test eax,edx

    eax:

    Nothing: 0
    Beasts: 1
    Dragonkin: 2
    Demons: 4
    Elementals: 8
    Giants: 16
    Undead: 32
    Humanoids: 64
    Misc: 132
    Everything: 255

    you can modify code -> test edx,edx

    to Everything

    Hex Edit: 005a8bad 85,c2 -> 85,d2
    Could someone explain how to do this ?


  4. #34
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1444
    Join Date
    Apr 2006
    Posts
    4,002
    Thanks G/R
    296/588
    Trade Feedback
    1 (100%)
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    he is giving you two options (i think). Change the EAX register to the value that you want or change the asm to test edx,edx (basicly return true)

  5. #35
    kynox's Avatar Member
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    FYI guys, any of the offsets in the following list are UNSAFE and you will be banned if modified. http://kynox.gamedeception.net/WardenLog.txt

  6. #36
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1444
    Join Date
    Apr 2006
    Posts
    4,002
    Thanks G/R
    296/588
    Trade Feedback
    1 (100%)
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    lol are you sure you will get banned? is it a CRC or does it just check for any memory writing to it? If its just a check for memory writing to it, then that is easily bypassed with the program i use but if its a CRC, not much we can do unless we bypass Warden.

  7. #37
    kynox's Avatar Member
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    It reads the bytes and then sends it back to the server for verification. A simple way to bypass it is just to remove any hooks, call the scan function and then re apply your hooks.

  8. #38
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1444
    Join Date
    Apr 2006
    Posts
    4,002
    Thanks G/R
    296/588
    Trade Feedback
    1 (100%)
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    yeah you used to be able to do the same thing with GameGuard (hooking Read Process Memory) but i never learned how to do that stuff >_<

  9. #39
    kynox's Avatar Member
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Warden is run under WoW.exe's main thread, so it doesn't need to use ReadProcessMemory to read memory, it just uses the REP opcode which reads directly from memory.

  10. #40
    Ermok's Avatar Contributor
    Reputation
    212
    Join Date
    Jul 2007
    Posts
    447
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by kynox View Post
    Warden is run under WoW.exe's main thread, so it doesn't need to use ReadProcessMemory to read memory, it just uses the REP opcode which reads directly from memory.
    So bassicly.. wardem has priority to access wow.exe which means it is faster at checking your memory write...? in which it can boot you off and tell wow.exe what to do?

  11. #41
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1444
    Join Date
    Apr 2006
    Posts
    4,002
    Thanks G/R
    296/588
    Trade Feedback
    1 (100%)
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    im guessing that REP means Read Entry Point? (or something like that) maybe you could allocate memory and have it thing that the begining of the allocation is the correct memory (since you cant simply tell it to read a .cem since its not an external program like GG)... If this is possible, i would think that it would be heavy on the CPU usage though. I'ma ask a good friend of mine about how we might go about bypassing warden.

  12. #42
    kynox's Avatar Member
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    No, it looks like this REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ESI]. It copies ECX DWORD's from ESI into EDI.

    The function itself is very easy to find, just set a memory on access BP on the SendChatMessage function, its one of its scanned functions.

    From here you can easily make a bypass like i have. Just look for a certain pattern of API and you should be fine!.

  13. #43
    Manky's Avatar Banned
    Reputation
    99
    Join Date
    Aug 2007
    Posts
    305
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    the speed hacks dont work for me?

  14. #44
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1444
    Join Date
    Apr 2006
    Posts
    4,002
    Thanks G/R
    296/588
    Trade Feedback
    1 (100%)
    Mentioned
    10 Post(s)
    Tagged
    0 Thread(s)
    it works just fine. All of them.

  15. #45
    Anic's Avatar Member
    Reputation
    1
    Join Date
    Nov 2007
    Posts
    55
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    good job

Page 3 of 6 FirstFirst 123456 LastLast

Similar Threads

  1. [Release]WoW 2.4 Addresses
    By Sychotix in forum WoW Memory Editing
    Replies: 72
    Last Post: 04-02-2008, 01:23 AM
  2. (Best release) WoW Together!!|Instant 70 Fun server!|Vendors!|Blizz-like!|
    By wowtogether in forum WoW Emulator Server Listings
    Replies: 0
    Last Post: 02-11-2008, 12:16 AM
  3. RELEASE: WoW 2.2.3 Mountain Climb Trainer(V3) (CE)
    By vivec45 in forum World of Warcraft Bots and Programs
    Replies: 44
    Last Post: 11-18-2007, 07:48 PM
  4. RELEASE: WoW 2.2.0 Mountain Climb Trainer(V2) (CE)
    By vivec45 in forum World of Warcraft Bots and Programs
    Replies: 44
    Last Post: 10-15-2007, 04:12 PM
All times are GMT -5. The time now is 01:52 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search