Opcodes... menu

Shout-Out

User Tag List

Thread: Opcodes...

Results 1 to 7 of 7
  1. #1
    chemicstry's Avatar Member
    Reputation
    1
    Join Date
    Jul 2010
    Posts
    6
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Opcodes...

    Firstly, I ask all those who knows about this not to be cocky with answers like "learn asm noob", "I know, you don't and don't ask", "[link_to_forum_rules]", "this is easy" etc.
    I'm asking this because all other threads that I found on search had similar answers.

    Ok, now back to topic. I have started looking on client reversing few days ago and yes I'm completely new to reverse engineering but I just need to know how to find some opcodes and their handlers so I can continue my C++ developement. CMSG and Jam packets are pretty easy but the thing I don't get is SMSG opcodes with offsets. I will numerate question so it will be easier to understand:
    1. What is an opcode offset? Does it point directly to opcode handler? What is it's reference point (I mean wow base address or some dword) ?
    2. Is it possible to get offset if I just have opcode handler?
    3. It would be nice if someone could write step by step guide on how to get opcode offset.

    Thanks!

    YES I HAVE USED SEARCH AND DIDN'T FIND ANYTHING

    Opcodes...
  2. #2
    GliderPro's Avatar Member
    Reputation
    -1
    Join Date
    Mar 2009
    Posts
    93
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    LEARN ASM NOOB! x86 instruction listings - Wikipedia, the free encyclopedia

    Oh. Wait. Are you talking about commands in the packets sent to the server? Got no clue about those.

  3. #3
    chemicstry's Avatar Member
    Reputation
    1
    Join Date
    Jul 2010
    Posts
    6
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by DarkLinux View Post
    Thats funny lolz... the guy with -4 rep and a username after a bot he did not code is calling out another noob lolz.. so funny...

    What you need to do...
    http://www.ownedcore.com/forums/worl...mp-thread.html + Cheat Engine + wow = answer...


    And if you dont know how to use CE...
    http://www.ownedcore.com/forums/worl...ngine-wow.html
    I know how to get offset in IDA, but I get something 6-8 hex digits long and opcode offsets usually are 4 digits decimal. In CE it's 6-8 digits too.

    v127 = off_1B5E1FC;
    *(_DWORD *)(dword_1D5DA5C + 4952) = v127;
    This is where handler is assigned for SMSG_EMOTE = 0x076FE. 4952 is the opcode offset and 0x151C40 is the handler address (with all those CDataStore). The problem is that I don't see any relationships between those numbers...

    Thanks for helping
    Last edited by chemicstry; 11-15-2011 at 04:36 AM.

  4. #4
    -Ryuk-'s Avatar Elite User CoreCoins Purchaser Authenticator enabled
    Reputation
    529
    Join Date
    Nov 2009
    Posts
    1,028
    Thanks G/R
    38/51
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Opcodes are randomized now... so you will need to find all of them, and make "good" patterns to find them automatically.

    Hint: Take a look at SendMovementUpdate, I learnt a lot about Opcodes from that
    |Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|

  5. #5
    chemicstry's Avatar Member
    Reputation
    1
    Join Date
    Jul 2010
    Posts
    6
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by -Ryuk- View Post
    Opcodes are randomized now... so you will need to find all of them, and make "good" patterns to find them automatically.

    Hint: Take a look at SendMovementUpdate, I learnt a lot about Opcodes from that
    I know that they are randomised. I just need to find some opcodes and their handlers, nothing more.

    PH_SMSG_GROUP_JOINED_BATTLEGROUND function address is 0x9243C0
    How do I get this opcode's offset?

  6. #6
    DrakeFish's Avatar Lazy Leecher

    Reputation
    634
    Join Date
    Nov 2008
    Posts
    569
    Thanks G/R
    0/14
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by chemicstry View Post
    I know that they are randomised. I just need to find some opcodes and their handlers, nothing more.

    PH_SMSG_GROUP_JOINED_BATTLEGROUND function address is 0x9243C0
    How do I get this opcode's offset?
    Look at what's calling it (or what's calling what's calling it..). It should be comparing the header of the packet (where the opcode is) with some number. This number will be your offset .

  7. #7
    LogicWin's Avatar Master Sergeant
    Reputation
    51
    Join Date
    Mar 2011
    Posts
    103
    Thanks G/R
    4/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    The big trick is to send those f*ckers

Similar Threads

  1. [4.0.0 12025] Opcode ID changed ?
    By Woweur in forum WoW Memory Editing
    Replies: 150
    Last Post: 10-03-2010, 04:20 AM
  2. [Client] OpCode/Packet Introductory help
    By Haith in forum WoW EMU Questions & Requests
    Replies: 2
    Last Post: 05-29-2010, 06:08 PM
  3. Id to send the opcode to play a movie
    By stoneharry in forum WoW EMU Questions & Requests
    Replies: 7
    Last Post: 05-26-2009, 12:41 PM
  4. How to send an OPCode from C++ script?
    By pcrew in forum WoW EMU Questions & Requests
    Replies: 2
    Last Post: 12-26-2008, 02:38 PM
  5. +rep for these 3.0.2 opcodes
    By Stabatha in forum WoW EMU Questions & Requests
    Replies: 3
    Last Post: 10-21-2008, 09:47 AM
All times are GMT -5. The time now is 10:29 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search