as the titile says...I tried to hook sub_561470 which InvalidPtrCheck calls but failed, What are you doing about this?
as the titile says...I tried to hook sub_561470 which InvalidPtrCheck calls but failed, What are you doing about this?
Put trampoline to your callback somewhere in code segment?
That seems to be the last way to handle it.... i'm now working on it and try to master the basis...
However, i'm now really upset because my account is banned....due to the lack of knowledge of Warden..
I'm now curious about it , is there any thread telling people how to know the address which warden is scanning?
Im sure InvalidPtrCheck(at least the start of it) has been scanned for ages.
You only need to edit a single byte, somewhere in the function(I won't tell you where) to get the exact same result.
|Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|
You don't need to edit anything. TOM_RUS had the best solution (put a callback somewhere in the .text segment of WoW.exe), however you can use VEH to create a trampoline without modifying anything in .text (register a callback to an instruction or set of instructions that will generate an exception, then use VEH to transfer control to your hook).
Not at all. I'm just encouraging them to look in the function.
However if you don't want to use the other methods described here, you can do this:
It's not the best way... but it works.Code:Memory.Write<byte>(Offsets.LuaInterface.InvalidPtrCheck, 0xEB); Offsets.LuaInterface.InvalidPtrCheck = 0x161972(Rebased)
|Leacher:11/2009|Donor:02/2010|Established Member:09/2010|Contributor:09/2010|Elite:08/2013|
Hook warden scan function, detour it, put the original bytes to the buffer. (using ASM code like REPE MOVSD/MOVSB)
@DarkLinux's EverScan (EverScan - An Open Source Warden Scanner) will help you get an easy start.