View previous topic :: View next topic |
Author |
Message |
shuva40raj How do I cheat?
Reputation: 0
Joined: 17 Sep 2013 Posts: 3
|
Posted: Wed Oct 09, 2013 6:25 am Post subject: Pointer adress that points to itself |
|
|
Hi all I don't know if I am posting this in right section or not but I could use some help. I was searching for pointers. I found the address for the property (eg health). Then I chose what writes (also tried what accesses this address) to this address and found the address was itself (if the address was ABCDEF then in debugger the pointer that points to the address is also ABCDEF) and when I searched that address there was no result. How can a pointer points to itself and is not static. (By the way the pointer is dynamic. It does change when game is restarted.) Can anybody help me with this?
|
|
Back to top |
|
 |
Gniarf Grandmaster Cheater Supreme
Reputation: 43
Joined: 12 Mar 2012 Posts: 1285
|
Posted: Wed Oct 09, 2013 7:04 am Post subject: |
|
|
1-You're still using the manual approach to search for pointers (as instructed by the tutorial), don't. Instead use the pointerscanner (right click->pointer scan). Lots of people are scared by the number of options it has; when in doubt don't touch.
2-The debugger tells you that "The value of the pointer needed to find this address is probably ABCDEF". For example if you have a code like: Code: | lea eax,[ebx+ecx*4]
mov [eax],edx <-this is what writes your health | CE will tell you to look for the value of eax, but actually you should look for ebx, and the offset will be 4*ecx.
Note that CE is NOT telling you that ABCDEF is the address where the pointer is, CE says that that pointer -wherever it is- is an integer whose value is ABCDEF, so it's not a pointer pointing to itself, it's a pointer that is exactly pointing to your variable and not a few bytes before.
...This or I completely misunderstood what you were saying...
_________________
DO NOT PM me if you want help on making/fixing/using a hack. |
|
Back to top |
|
 |
shuva40raj How do I cheat?
Reputation: 0
Joined: 17 Sep 2013 Posts: 3
|
Posted: Wed Oct 09, 2013 9:16 am Post subject: |
|
|
I wanted to attach picture for this but I cannot post url here it would not let me nor I can attach pictures as it will not allow. Now I will try to explain it says
---------------------------------------------------------------------------------------
bunch of codes similar to below are up here
>> 0047F71B - fstp dword ptr [edx] {this line is written in red and there is nothing after [edx] }
bunch of codes similar to above are here
store single
The value of this pointer needed to find this address is probably 0F4B4E10
Then values for edx, is 0F4B4E10 and there are other values for EAX EBX.....
----------------------------------------------------------------------------------------
Now the address that I used to find this is also 0F4B4E10. Then I searched for hex value for 0F4B4E10 to find static pointer no result were produced. Isn't value of edx is what we are looking for to search for pointers? I never got as the code you have said.
Also the pointer scan did not produce any result.
|
|
Back to top |
|
 |
Gniarf Grandmaster Cheater Supreme
Reputation: 43
Joined: 12 Mar 2012 Posts: 1285
|
Posted: Wed Oct 09, 2013 9:51 am Post subject: |
|
|
shuva40raj wrote: | Isn't value of edx is what we are looking for to search for pointers? | No, not always. In the "find out what..." window you should have a "show disassembler" button that will take you too the code at 0047F71B. Go there and scroll UP to see what's tampering with edx, likely you'll either find a lea edx,[???], an add edx,??? or a mov edx,[ebp_or_esp+???]. The first two are used to add an offset to a pointer (not a level of indirection) and are what fool CE, and the mov *** ebp/esp means that the offset is added in one of the parent functions.
shuva40raj wrote: | Also the pointer scan did not produce any result. | Ah...That's bad. Usually in those cases we recommend trying a bigger structure size (the 2048 at the bottom) and/or maximum level (5 by default).
Untick "Only find paths with a static..." and if you do not get a single result at all, try increasing the structure size first.
Bear in mind that a pointer that doesn't contain a static address is pretty much useless, so unticking this option is just for diagnostic purposes.
Also, are you hacking a game within an emulator? Or does your game use a script engine (lua, squirrel, python, ruby and the likes)
In the "find out what..." right click on the white area->"check if found opcodes also access other...". A number between parenthesis should pop in the count column which is the number of addresses accessed by this opcode. See if you have a piece of code that is only used to access your health and nothing else.
Oh, and one possible oddity: try manual scanning for 0F4B4E10 with the "fast scan" option off. I doubt you'll get an useful result, but worth a shot anyway.
_________________
DO NOT PM me if you want help on making/fixing/using a hack. |
|
Back to top |
|
 |
shuva40raj How do I cheat?
Reputation: 0
Joined: 17 Sep 2013 Posts: 3
|
Posted: Wed Oct 09, 2013 12:36 pm Post subject: |
|
|
I was trying to lower inflation rate in supreme ruler 2020
yes just little above there was:
lea eax,[ecx+edx+68] {this was done in new scan so edx changed to eax}
Then I searched for the address that would point to and walla that was the base address thank you for the help Greatly appreciated.
|
|
Back to top |
|
 |
|