Asm manipulation with BlackMagic menu

User Tag List

Results 1 to 3 of 3
  1. #1
    nopz's Avatar Active Member
    Reputation
    67
    Join Date
    Aug 2009
    Posts
    56
    Thanks G/R
    1/3
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)

    Asm manipulation with BlackMagic

    Hello,

    I was doing some test as I'm currently trying to learn things and understand how they works by myself.
    As a test i was trying to reverse ObjectCurMgr (refering to this thread by bobbysing on gamedeception : How to find stuff - Game Deception - Forums), here is the asm i try to Inject using BlackMagic :

    I was reading BlackMagic Documentation and Some methods of Fasm are undocumented that's why i made this post.

    Code:
    MOV ECX, DWORD PTR FS:[0x2C]
    MOV EAX, DWORD PTR DS:[0x1341104]
    MOV EDX, DWORD PTR DS:[ECX+EAX*4]
    MOV EAX, DWORD PTR DS:[EDX+0x8]
    This might be wrong, but as i said i'm trying to reverse and learn by myself, don't be rude for that.

    So here is my asm with blackmagic :

    Code:
    ....
    ....
    ProcessManager.WowProcess.Asm.AddLine("MOV ECX, DWORD PTR FS:[0x2C]");
    ProcessManager.WowProcess.Asm.AddLine("MOV EAX, DWORD PTR DS:[0x01341104]");
    ProcessManager.WowProcess.Asm.AddLine("MOV EDX, DWORD PTR DS:[ECX+EAX*4]");
    ProcessManager.WowProcess.Asm.AddLine("MOV EAX, DWORD PTR DS:[EDX+0x8]");
    ProcessManager.WowProcess.Asm.AddLine("MOV "+result+", EAX");
    try
    {
      ProcessManager.WowProcess.Asm.Inject(codecave);
    }
    catch (Exception e)
    {
      ProcessManager.ResumeMainWowThread();
      throw e;
    }
    result is a uint
    My blog: https://pimpmykitty.wordpress.com
    PyFasm: https://github.com/srounet/pyfasm
    Pymem: https://github.com/srounet/pymem

    Asm manipulation with BlackMagic
  2. #2
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    That will only work if you're in the main thread, hence thread-local storage. You have to grab it from the pointers listed on these forums.

  3. #3
    nopz's Avatar Active Member
    Reputation
    67
    Join Date
    Aug 2009
    Posts
    56
    Thanks G/R
    1/3
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Well, this is called from the main thread anyway it still return 0 for result.
    I was wondering if it's normal or not, because in C++ it seems to work like that :

    Code:
    _asm {
    MOV ECX, DWORD PTR FS:[0x2C]
    MOV EAX, DWORD PTR DS:[0x1341104]
    MOV EDX, DWORD PTR DS:[ECX+EAX*4]
    MOV EAX, DWORD PTR DS:[EDX+0x8]
    MOV result, EAX
    }
    so after injection result containt the value of EAX.
    My blog: https://pimpmykitty.wordpress.com
    PyFasm: https://github.com/srounet/pyfasm
    Pymem: https://github.com/srounet/pymem

Similar Threads

  1. Incompatible "ImagList" object with blackmagic!?
    By sefi89 in forum WoW Bots Questions & Requests
    Replies: 1
    Last Post: 04-27-2012, 04:43 PM
  2. Replies: 7
    Last Post: 02-13-2012, 06:56 AM
  3. i even dont work out my GetLocalizedText code with blackmagic
    By ivyvan29 in forum WoW Memory Editing
    Replies: 2
    Last Post: 12-18-2011, 11:46 AM
  4. Executing remote sub/thread with BlackMagic
    By Burningmace in forum WoW Memory Editing
    Replies: 13
    Last Post: 02-11-2010, 07:59 PM
  5. Problem compiling with BlackMagic
    By gr3ger in forum WoW Memory Editing
    Replies: 4
    Last Post: 08-21-2009, 04:08 AM
All times are GMT -5. The time now is 09:57 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search