ZoneText Pointer messed up? menu

User Tag List

Page 1 of 2 12 LastLast
Results 1 to 15 of 16
  1. #1
    jockel's Avatar Member
    Reputation
    4
    Join Date
    Mar 2009
    Posts
    54
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    ZoneText Pointer messed up?

    Heya guys,

    normally I do find the pointer to the ZoneText via looking at the "GetZoneText" function.

    I marked the offsets I'm normally using red and bold.

    This is what it looks like in 3.1.2
    Code:
    .text:006E0780                 push    ebp
    .text:006E0781                 mov     ebp, esp
    .text:006E0783                 mov     eax, dword_11D3F3C
    .text:006E0788                 test    eax, eax
    .text:006E078A                 jnz     short loc_6E0791
    .text:006E078C                 mov     eax, offset unk_981B4F
    And this from 3.1.1

    Code:
    .text:006DDC50                 push    ebp
    .text:006DDC51                 mov     ebp, esp
    .text:006DDC53                 mov     eax, dword_11CCF14
    .text:006DDC58                 test    eax, eax
    .text:006DDC5A                 jnz     short loc_6DDC61
    .text:006DDC5C                 mov     eax, offset unk_97CB47
    Reading the pointer to the string from that address was working flawlessly in 3.1.1 but using this address with 3.1.2 is totally messed up.

    Sometimes I have to restart WoW 5 times until the pointer points to the zone text, otherwise it points to some random crap.

    Any idea on this guys? Can someone verify that behaviour?

    ZoneText Pointer messed up?
  2. #2
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Well I'm at work so I can't look at the context around this snippet, but from the asm it doesn't look like the static is being accessed any differently. I reckon it's being stored differently, so you'll have to track references to this static in IDA to see where/when/how it's being stored. Frankly, I'd start from the packet recv for zone enter (or whatever it is) and step down from there, but -- I'm NOT an exert in the internals of WoW (yet).

  3. #3
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Slap a BP on that bitch and /run it in-game. See what's going on through Olly. Do it on a trial though, seems as if Blizz has stepped up their game a bit.

  4. #4
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Ah crap, are they detecting debuggers now? I'm usually confident that I can get one hard breakpoint even with good old Windbg (after I've done an int3, I assume that WoW is compromised so I just kill the process after I'm done hacking at it).

    EDIT: actually, that begs a bigger question I've been wondering for a bit. What's the safest way (short of running against an emulator) to sandbox WoW while hacking away? Run as trial, obviously, but do you guys do anything like socksify your net connection to dis***** your IP?

  5. #5
    Nesox's Avatar ★ Elder ★
    Reputation
    1280
    Join Date
    Mar 2007
    Posts
    1,238
    Thanks G/R
    0/3
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    I use a trial account and a VPN and a modified ollydbg. But i use it on my normal account too sometimes

  6. #6
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Well. You could patch the TLS so that when they call IsBeingDebugged() it always returns zero. Either that or hook the func... Rather patch the address... They can detect H/W bp's pretty easily. And obviously software BPs as you can see at the login screen, but that's just hashing.

  7. #7
    Barnzy's Avatar Member
    Reputation
    67
    Join Date
    Jun 2008
    Posts
    302
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Just fill it with NULL's the (IsBeingDebugged and IsDebbugerActive

  8. #8
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Yeah, I can patch the PEB flags out, but I assumed that they are checking for running processes named [whatever Ollydbg's proc name is] or [whatever IDA's proc name is], etc. Meaning that unless I do the whole stealth package, I'm still a tad paranoid. Of course, I can always break in and leave it frozen (which is what I normally do), but that's really not much better than a memory dump.

    Running through trial and VPN is probably good enough for me; if there's no way for them to link my trial to my "real" toons, I'm happy (and, in fact, bans can be instructive )

    Thanks for the protips.

  9. #9
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    I guess that's an option, but a little bit ugly imo.

  10. #10
    Bobbysing's Avatar Member
    Reputation
    192
    Join Date
    Jan 2009
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Works perfectly fine for me, you must be doing something wrong.

    Here are the steps I did:
    Start WoW and log in
    Attach OllyDbg
    Press CTRL+G and enter "[11D3F3C]" ( goes to the address that 11D3F3C points to )
    Right click -> Follow in dump -> selection

    You should be able to see the name of the zone there ( window in the bottom-left )


    Also, the debugger detection you are talking about doesn't exist in WoW and Blizzard only bans the accounts that were detected by warden, they don't ban accounts that run with them on the same IP but did nothing wrong.

  11. #11
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Eh, never hurts to be safe It's not a big deal anyway, just a patch or two.

  12. #12
    jockel's Avatar Member
    Reputation
    4
    Join Date
    Mar 2009
    Posts
    54
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Bobbysing View Post
    Works perfectly fine for me, you must be doing something wrong.
    Thanks for verifying that stuff, I don't know what was going on, but after I restarted my computer my program displayed the zone correctly.

    Even CheatEngine was displaying the ZoneText pointer wrong before I went to restart, so I have no guess what was going on.

    Ty @all

  13. #13
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Bobbysing View Post
    Also, the debugger detection you are talking about doesn't exist in WoW and Blizzard only bans the accounts that were detected by warden, they don't ban accounts that run with them on the same IP but did nothing wrong.
    Useful to know. I'd heard somewhere that Blizz did blanket-bans on an IP after Warden flags an account. I guess that with the prevalence of NAT's, that wouldn't work so well; I should have thought it out a bit further.

    So, just trial accounts then... nice. Probably still doesn't hurt to patch the PEB, as lanman says -- it's easy.

  14. #14
    kynox's Avatar Member
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    There are a plethora of anti-debug plugins out there for ollydbg. I personally use Stealth64 as i'm on a x64 platform. For x86, i would suggest Olly Advanced.

  15. #15
    amadmonk's Avatar Active Member
    Reputation
    124
    Join Date
    Apr 2008
    Posts
    772
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    I'm using x64, so I'll look into Stealth64. Frankly, I've been using Windbg (as it's been fine for me), but I may load Olly tonight to see why all the heavyweights recommend it...

Page 1 of 2 12 LastLast

Similar Threads

  1. mess with flight master Daelyshia
    By jackus in forum World of Warcraft Exploits
    Replies: 3
    Last Post: 01-07-2007, 10:08 PM
  2. Will having regular WoW mess this up?
    By Kensai in forum World of Warcraft General
    Replies: 3
    Last Post: 12-25-2006, 06:22 AM
  3. More pointer ideas.
    By Eldretch in forum World of Warcraft General
    Replies: 0
    Last Post: 08-09-2006, 06:34 AM
  4. What I found messing around in IF
    By chaosrevenge in forum World of Warcraft General
    Replies: 9
    Last Post: 06-16-2006, 09:59 AM
All times are GMT -5. The time now is 12:42 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search