w0uter Posted January 19, 2006 Share Posted January 19, 2006 (edited) *edit nvm i got it just compile it expandcollapse popup#region _Mem() Func _MemOpen($i_Pid, $i_Access = 0x1F0FFF, $i_Inherit = 0) Local $av_Return[2] = [DllOpen('kernel32.dll') ] Local $ai_Handle = DllCall($av_Return[0], 'int', 'OpenProcess', 'int', $i_Access, 'int', $i_Inherit, 'int', $i_Pid) If @error Then DllClose($av_Return[0]) SetError(1) Return 0 EndIf $av_Return[1] = $ai_Handle[0] Return $av_Return EndFunc ;==>_MemOpen Func _MemRead($ah_Mem, $i_Address, $i_Size = 0) If $i_Size = 0 Then Local $v_Return = '' Local $v_Struct = DllStructCreate('byte[1]') Local $v_Ret While 1 $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', 1, 'int', '') $v_Ret = DllStructGetData($v_Struct, 1) If $v_Ret = 0 Then ExitLoop $v_Return &= Chr($v_Ret) $i_Address += 1 WEnd Else Local $v_Struct = DllStructCreate('byte[' & $i_Size & ']') Local $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', $i_Size, 'int', '') Local $v_Return[$v_Ret[4]] For $i = 0 To $v_Ret[4] - 1 $v_Return[$i] = DllStructGetData($v_Struct, 1, $i + 1) Next EndIf Return $v_Return EndFunc ;==>_MemRead Func _MemWrite($ah_Mem, $i_Address, $v_Inject) Local $av_Call = DllCall($ah_Mem[0], 'int', 'WriteProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Inject), 'int', DllStructGetSize($v_Inject), 'int', '') Return $av_Call[0] EndFunc ;==>_MemWrite Func _MemClose($ah_Mem) Local $av_Ret = DllCall($ah_Mem[0], 'int', 'CloseHandle', 'int', $ah_Mem[1]) DllClose($ah_Mem[0]) Return $av_Ret[0] EndFunc ;==>_MemClose Func _MemCreate($1, $2 = 0, $3 = 0, $4 = 0, $5 = 0, $6 = 0, $7 = 0, $8 = 0, $9 = 0, $10 = 0, $11 = 0, $12 = 0, $13 = 0, $14 = 0, $15 = 0, _ $16 = 0, $17 = 0, $18 = 0, $19 = 0, $20 = 0, $21 = 0, $22 = 0, $23 = 0, $24 = 0, $25 = 0, $26 = 0, $27 = 0, $28 = 0, $29 = 0, _ $30 = 0, $31 = 0, $32 = 0, $33 = 0, $34 = 0, $35 = 0, $36 = 0, $37 = 0, $38 = 0, $39 = 0, $40 = 0, $41 = 0, $42 = 0, $43 = 0, _ $44 = 0, $45 = 0, $46 = 0, $47 = 0, $48 = 0, $49 = 0, $50 = 0, $51 = 0, $52 = 0, $53 = 0, $54 = 0, $55 = 0, $56 = 0, $57 = 0, _ $58 = 0, $59 = 0, $60 = 0, $61 = 0, $62 = 0, $63 = 0, $64 = 0, $65 = 0, $66 = 0, $67 = 0, $68 = 0, $69 = 0, $70 = 0, $71 = 0, _ $72 = 0, $73 = 0, $74 = 0, $75 = 0, $76 = 0, $77 = 0, $78 = 0, $79 = 0, $80 = 0, $81 = 0, $82 = 0, $83 = 0, $84 = 0, $85 = 0, _ $86 = 0, $87 = 0, $88 = 0, $89 = 0, $90 = 0, $91 = 0, $92 = 0, $93 = 0, $94 = 0, $95 = 0, $96 = 0, $97 = 0, $98 = 0, $99 = 0) If IsString($1) Then $1 = StringSplit($1, '') Local $v_Helper = DllStructCreate('byte[' & UBound($1) & ']') For $i = 1 To UBound($1) - 1 DllStructSetData($v_Helper, 1, Asc($1[$i]), $i) Next Else Local $v_Helper = DllStructCreate('byte[' & @NumParams & ']') For $i = 1 To @NumParams DllStructSetData($v_Helper, 1, Eval($i), $i) Next EndIf Return $v_Helper EndFunc ;==>_MemCreate Func _MemRev($v_DWORD) If UBound($v_DWORD) = 4 Then Return '0x' & Hex($v_DWORD[3], 2) & Hex($v_DWORD[2], 2) & Hex($v_DWORD[1], 2) & Hex($v_DWORD[0], 2) Local $v_Ret[4] = ['0x' & StringMid(Hex($v_DWORD, 8), 7, 2), '0x' & StringMid(Hex($v_DWORD, 8), 5, 2), '0x' & StringMid(Hex($v_DWORD, 8), 3, 2), '0x' & StringMid(Hex($v_DWORD, 8), 1, 2) ] Return $v_Ret EndFunc ;==>_MemRev Func _MemAlloc($ah_Mem, $i_Size, $i_Address = 0, $i_AT = 4096, $i_Protect = 0x40) Switch @OSVersion Case "WIN_ME", "WIN_98", "WIN_95" $i_AT = BitOR($i_AT, 0x8000000); UNDOCUMENTED VA_SHARED $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAlloc', 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect) Case Else $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAllocEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect) EndSwitch Return $av_Alloc[0] EndFunc ;==>_MemAlloc Func _MemFree($ah_Mem, $i_Address) Switch @OSVersion Case "WIN_ME", "WIN_98", "WIN_95" $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFree', 'int', $i_Address, 'int', 0, 'int', 0x8000) Case Else $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFreeEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', 0, 'int', 0x8000) EndSwitch Return $av_Free[0] EndFunc ;==>_MemFree Func _MemText($ah_Mem, $s_Text) Local $i_Size = StringLen($s_Text) + 1 Local $i_Addr = _MemAlloc($ah_Mem, $i_Size) _MemWrite($ah_Mem, $i_Addr, _MemCreate($s_Text)) Return $i_Addr EndFunc ;==>_MemText #endregion ProcessSetPriority(@AutoItPID, 5) ;open $i_Open = _MemOpen(@AutoItPID) ;RVA $i = 0x401000 ;byte pattern match Dim $as_Match[18] = ['EB', '0D', '57', '53', 'FF', '75', '08', '6A', '00', 'FF', '15', '8B', '4D', '0C'] ;progress GUISetFont(9, 400, 0, 'Courier') GUICreate("RVA Progress", 115, 30, (@DesktopWidth - 115) / 2, (@DesktopHeight - 31) / 2, -2134900736) GUICtrlCreateLabel("Scanning:", 8, 9, 50, 20) $h_Scan = GUICtrlCreateLabel("00000000", 60, 10, 55, 20) GUISetState() While 1 ;Set progress GUICtrlSetData($h_Scan, Hex($i, 8)) ;read code $ai_Code = _MemRead($i_Open, $i, 18) ;match the first 10 For $x = 0 To 10 If Hex($ai_Code[$x], 2) <> $as_Match[$x] Then ExitLoop Next ;if all matched If $x = 11 Then ;match the last 3 For $x = 15 To 17 If Hex($ai_Code[$x], 2) <> $as_Match[$x - 4] Then ExitLoop Next ;all matched If $x = 18 Then ;patch point Dim $i_Patch_Start = $i + 2 ;return after hijack Dim $i_Patch_End = _MemRev($i + 9) ;Kernel32.MessageBoxA Offset Dim $i_Patch_MBoxA[4] = [$ai_Code[11], $ai_Code[12], $ai_Code[13], $ai_Code[14]] ExitLoop EndIf EndIf ;inc RVA $i += 1 WEnd ;delete gui GUIDelete() #cs 0 00417806 /EB 0D JMP SHORT Mem_Hard.00417815 2 00417808 |57 PUSH EDI 3 00417809 |53 PUSH EBX 4 0041780A |FF75 08 PUSH DWORD PTR SS:[EBP+8] 7 0041780D |6A 00 PUSH 0 9 0041780F |FF15 BCEB4600 CALL NEAR DWORD PTR DS:[46EBBC] ; USER32.MessageBoxA 15 00417815 \8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C] #ce ;create string in memory & reverse the pointers for storing. $i_Title = _MemText($i_Open, 'Hacked') $i_Title_r = _MemRev($i_Title) $i_Text = _MemText($i_Open, 'I Got Hijacked.') $i_Text_r = _MemRev($i_Text) ; alloc $i_Alloc = _MemAlloc($i_Open, 26) ; write the code _MemWrite($i_Open, $i_Alloc, _MemCreate(0x6A, 0, _ 0x68, $i_Title_r[0], $i_Title_r[1], $i_Title_r[2], $i_Title_r[3], _ 0x68, $i_Text_r[0], $i_Text_r[1], $i_Text_r[2], $i_Text_r[3], _ 0x6A, 0, _ 0xFF, 0x15, $i_Patch_MBoxA[0], $i_Patch_MBoxA[1], $i_Patch_MBoxA[2], $i_Patch_MBoxA[3], _ 0x68, $i_Patch_End[0], $i_Patch_End[1], $i_Patch_End[2], $i_Patch_End[3], _ 0xC3)) ;reverse the pointer $ai_Rev = _MemRev($i_Alloc) ;redirect the code to our code. _MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x68, $ai_Rev[0], $ai_Rev[1], $ai_Rev[2], $ai_Rev[3], 0xC3)) ;spawn a msgbox MsgBox(0, 'title', 'text') ;restore original _MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x57, 0x53, 255, 0x75, 8, 0x6A)) _MemFree($i_Open, $i_Title) _MemFree($i_Open, $i_Text) _MemFree($i_Open, $i_Alloc) _MemClose($i_Open) ;spawn a msgbox MsgBox(0, 'title', 'text') Edited January 19, 2006 by w0uter My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
seandisanti Posted January 19, 2006 Share Posted January 19, 2006 *edit nvm i got it just compile it expandcollapse popup#region _Mem() Func _MemOpen($i_Pid, $i_Access = 0x1F0FFF, $i_Inherit = 0) Local $av_Return[2] = [DllOpen('kernel32.dll') ] Local $ai_Handle = DllCall($av_Return[0], 'int', 'OpenProcess', 'int', $i_Access, 'int', $i_Inherit, 'int', $i_Pid) If @error Then DllClose($av_Return[0]) SetError(1) Return 0 EndIf $av_Return[1] = $ai_Handle[0] Return $av_Return EndFunc;==>_MemOpen Func _MemRead($ah_Mem, $i_Address, $i_Size = 0) If $i_Size = 0 Then Local $v_Return = '' Local $v_Struct = DllStructCreate('byte[1]') Local $v_Ret While 1 $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', 1, 'int', '') $v_Ret = DllStructGetData($v_Struct, 1) If $v_Ret = 0 Then ExitLoop $v_Return &= Chr($v_Ret) $i_Address += 1 WEnd Else Local $v_Struct = DllStructCreate('byte[' & $i_Size & ']') Local $v_Ret = DllCall($ah_Mem[0], 'int', 'ReadProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Struct), 'int', $i_Size, 'int', '') Local $v_Return[$v_Ret[4]] For $i = 0 To $v_Ret[4] - 1 $v_Return[$i] = DllStructGetData($v_Struct, 1, $i + 1) Next EndIf Return $v_Return EndFunc;==>_MemRead Func _MemWrite($ah_Mem, $i_Address, $v_Inject) Local $av_Call = DllCall($ah_Mem[0], 'int', 'WriteProcessMemory', 'int', $ah_Mem[1], 'int', $i_Address, 'ptr', DllStructGetPtr($v_Inject), 'int', DllStructGetSize($v_Inject), 'int', '') Return $av_Call[0] EndFunc;==>_MemWrite Func _MemClose($ah_Mem) Local $av_Ret = DllCall($ah_Mem[0], 'int', 'CloseHandle', 'int', $ah_Mem[1]) DllClose($ah_Mem[0]) Return $av_Ret[0] EndFunc;==>_MemClose Func _MemCreate($1, $2 = 0, $3 = 0, $4 = 0, $5 = 0, $6 = 0, $7 = 0, $8 = 0, $9 = 0, $10 = 0, $11 = 0, $12 = 0, $13 = 0, $14 = 0, $15 = 0, _ $16 = 0, $17 = 0, $18 = 0, $19 = 0, $20 = 0, $21 = 0, $22 = 0, $23 = 0, $24 = 0, $25 = 0, $26 = 0, $27 = 0, $28 = 0, $29 = 0, _ $30 = 0, $31 = 0, $32 = 0, $33 = 0, $34 = 0, $35 = 0, $36 = 0, $37 = 0, $38 = 0, $39 = 0, $40 = 0, $41 = 0, $42 = 0, $43 = 0, _ $44 = 0, $45 = 0, $46 = 0, $47 = 0, $48 = 0, $49 = 0, $50 = 0, $51 = 0, $52 = 0, $53 = 0, $54 = 0, $55 = 0, $56 = 0, $57 = 0, _ $58 = 0, $59 = 0, $60 = 0, $61 = 0, $62 = 0, $63 = 0, $64 = 0, $65 = 0, $66 = 0, $67 = 0, $68 = 0, $69 = 0, $70 = 0, $71 = 0, _ $72 = 0, $73 = 0, $74 = 0, $75 = 0, $76 = 0, $77 = 0, $78 = 0, $79 = 0, $80 = 0, $81 = 0, $82 = 0, $83 = 0, $84 = 0, $85 = 0, _ $86 = 0, $87 = 0, $88 = 0, $89 = 0, $90 = 0, $91 = 0, $92 = 0, $93 = 0, $94 = 0, $95 = 0, $96 = 0, $97 = 0, $98 = 0, $99 = 0) If IsString($1) Then $1 = StringSplit($1, '') Local $v_Helper = DllStructCreate('byte[' & UBound($1) & ']') For $i = 1 To UBound($1) - 1 DllStructSetData($v_Helper, 1, Asc($1[$i]), $i) Next Else Local $v_Helper = DllStructCreate('byte[' & @NumParams & ']') For $i = 1 To @NumParams DllStructSetData($v_Helper, 1, Eval($i), $i) Next EndIf Return $v_Helper EndFunc;==>_MemCreate Func _MemRev($v_DWORD) If UBound($v_DWORD) = 4 Then Return '0x' & Hex($v_DWORD[3], 2) & Hex($v_DWORD[2], 2) & Hex($v_DWORD[1], 2) & Hex($v_DWORD[0], 2) Local $v_Ret[4] = ['0x' & StringMid(Hex($v_DWORD, 8), 7, 2), '0x' & StringMid(Hex($v_DWORD, 8), 5, 2), '0x' & StringMid(Hex($v_DWORD, 8), 3, 2), '0x' & StringMid(Hex($v_DWORD, 8), 1, 2) ] Return $v_Ret EndFunc;==>_MemRev Func _MemAlloc($ah_Mem, $i_Size, $i_Address = 0, $i_AT = 4096, $i_Protect = 0x40) Switch @OSVersion Case "WIN_ME", "WIN_98", "WIN_95" $i_AT = BitOR($i_AT, 0x8000000); UNDOCUMENTED VA_SHARED $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAlloc', 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect) Case Else $av_Alloc = DllCall($ah_Mem[0], 'int', 'VirtualAllocEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', $i_Size, 'int', $i_AT, 'int', $i_Protect) EndSwitch Return $av_Alloc[0] EndFunc;==>_MemAlloc Func _MemFree($ah_Mem, $i_Address) Switch @OSVersion Case "WIN_ME", "WIN_98", "WIN_95" $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFree', 'int', $i_Address, 'int', 0, 'int', 0x8000) Case Else $av_Free = DllCall($ah_Mem[0], 'int', 'VirtualFreeEx', 'int', $ah_Mem[1], 'int', $i_Address, 'int', 0, 'int', 0x8000) EndSwitch Return $av_Free[0] EndFunc;==>_MemFree Func _MemText($ah_Mem, $s_Text) Local $i_Size = StringLen($s_Text) + 1 Local $i_Addr = _MemAlloc($ah_Mem, $i_Size) _MemWrite($ah_Mem, $i_Addr, _MemCreate($s_Text)) Return $i_Addr EndFunc;==>_MemText #endregion ProcessSetPriority(@AutoItPID, 5) ;open $i_Open = _MemOpen(@AutoItPID) ;RVA $i = 0x401000 ;byte pattern match Dim $as_Match[18] = ['EB', '0D', '57', '53', 'FF', '75', '08', '6A', '00', 'FF', '15', '8B', '4D', '0C'] ;progress GUISetFont(9, 400, 0, 'Courier') GUICreate("RVA Progress", 115, 30, (@DesktopWidth - 115) / 2, (@DesktopHeight - 31) / 2, -2134900736) GUICtrlCreateLabel("Scanning:", 8, 9, 50, 20) $h_Scan = GUICtrlCreateLabel("00000000", 60, 10, 55, 20) GUISetState() While 1 ;Set progress GUICtrlSetData($h_Scan, Hex($i, 8)) ;read code $ai_Code = _MemRead($i_Open, $i, 18) ;match the first 10 For $x = 0 To 10 If Hex($ai_Code[$x], 2) <> $as_Match[$x] Then ExitLoop Next ;if all matched If $x = 11 Then ;match the last 3 For $x = 15 To 17 If Hex($ai_Code[$x], 2) <> $as_Match[$x - 4] Then ExitLoop Next ;all matched If $x = 18 Then ;patch point Dim $i_Patch_Start = $i + 2 ;return after hijack Dim $i_Patch_End = _MemRev($i + 9) ;Kernel32.MessageBoxA Offset Dim $i_Patch_MBoxA[4] = [$ai_Code[11], $ai_Code[12], $ai_Code[13], $ai_Code[14]] ExitLoop EndIf EndIf ;inc RVA $i += 1 WEnd ;delete gui GUIDelete() #cs 0 00417806 /EB 0D JMP SHORT Mem_Hard.00417815 2 00417808 |57 PUSH EDI 3 00417809 |53 PUSH EBX 4 0041780A |FF75 08 PUSH DWORD PTR SS:[EBP+8] 7 0041780D |6A 00 PUSH 0 9 0041780F |FF15 BCEB4600 CALL NEAR DWORD PTR DS:[46EBBC] ; USER32.MessageBoxA 15 00417815 \8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C] #ce ;create string in memory & reverse the pointers for storing. $i_Title = _MemText($i_Open, 'Hacked') $i_Title_r = _MemRev($i_Title) $i_Text = _MemText($i_Open, 'I Got Hijacked.') $i_Text_r = _MemRev($i_Text) ; alloc $i_Alloc = _MemAlloc($i_Open, 26) ; write the code _MemWrite($i_Open, $i_Alloc, _MemCreate(0x6A, 0, _ 0x68, $i_Title_r[0], $i_Title_r[1], $i_Title_r[2], $i_Title_r[3], _ 0x68, $i_Text_r[0], $i_Text_r[1], $i_Text_r[2], $i_Text_r[3], _ 0x6A, 0, _ 0xFF, 0x15, $i_Patch_MBoxA[0], $i_Patch_MBoxA[1], $i_Patch_MBoxA[2], $i_Patch_MBoxA[3], _ 0x68, $i_Patch_End[0], $i_Patch_End[1], $i_Patch_End[2], $i_Patch_End[3], _ 0xC3)) ;reverse the pointer $ai_Rev = _MemRev($i_Alloc) ;redirect the code to our code. _MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x68, $ai_Rev[0], $ai_Rev[1], $ai_Rev[2], $ai_Rev[3], 0xC3)) ;spawn a msgbox MsgBox(0, 'title', 'text') ;restore original _MemWrite($i_Open, $i_Patch_Start, _MemCreate(0x57, 0x53, 255, 0x75, 8, 0x6A)) _MemFree($i_Open, $i_Title) _MemFree($i_Open, $i_Text) _MemFree($i_Open, $i_Alloc) _MemClose($i_Open) ;spawn a msgbox MsgBox(0, 'title', 'text')sorry... what does it do? Link to comment Share on other sites More sharing options...
Moderators SmOke_N Posted January 19, 2006 Moderators Share Posted January 19, 2006 sorry... what does it do?Errr... all I saw was it showing memory addresses, and then it says:::: I got hijacked! LMAO!! Common sense plays a role in the basics of understanding AutoIt... If you're lacking in that, do us all a favor, and step away from the computer. Link to comment Share on other sites More sharing options...
seandisanti Posted January 19, 2006 Share Posted January 19, 2006 Errr... all I saw was it showing memory addresses, and then it says:::: I got hijacked! LMAO!!yeah, that's one of the lines that popped out at me in the code. I'm sure w0uter wouldn't be putting up bad stuff, but my luck today's the day Sim learned how to code and wrote a script to bruteforce W's password... Link to comment Share on other sites More sharing options...
w0uter Posted January 19, 2006 Author Share Posted January 19, 2006 (edited) with I i ment the Messagebox in the code there is 2x ;spawn a msgbox MsgBox(0, 'title', 'text') but the 1st messagebox is redirected to my own code. its just an example of an search & replace memory patcher and Sim or another of his 100 aliasses cant code btw if i wanted to do harm i would have used an decription algoritm in asm and not plaintext Edited January 19, 2006 by w0uter My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
Bert Posted January 19, 2006 Share Posted January 19, 2006 (edited) Dumb question from one who is currently without knowledge on the subject...and I know I'm straying off topic here....but who is Sim? (I hope I'm not opening a can of worms here, I'm just somewhat curious) Edited January 19, 2006 by vollyman The Vollatran project My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
w0uter Posted January 19, 2006 Author Share Posted January 19, 2006 more like a bucket of snakes ... search the forums My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
Bert Posted January 19, 2006 Share Posted January 19, 2006 I remember this.... jerk that tries to make viruses. The uses the logic that Microsoft should fix their code, and because microsoft's code has a bug in it, he makes it his DUTY IN LIFE to exploit it, and make everyone suffer. WHAT A !!!!!!!I'm directing this directly @ Sim, or what ever his/her name is: Do you get a feeling of being important by acting like this? You think: "Look how smart I am. I can take down a big giant of a company, and crash lots of PCs. I can steal people's stuff too. " All you end up doing is causing alot of people pain and lots of extra work cleaning up your mess. People like you should be shot, and left for dead. (sorry, like that just ge me all ) The Vollatran project My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
w0uter Posted January 19, 2006 Author Share Posted January 19, 2006 (edited) just ignore him and he will go away ... posts like this only gets him happy. but back to my code any thoughts on it ? Edited January 19, 2006 by w0uter My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
seandisanti Posted January 19, 2006 Share Posted January 19, 2006 with I i ment the Messagebox in the code there is 2x ;spawn a msgbox MsgBox(0, 'title', 'text') but the 1st messagebox is redirected to my own code. its just an example of an search & replace memory patcher and Sim or another of his 100 aliasses cant code btw if i wanted to do harm i would have used an decription algoritm in asm and not plaintext right. i figured it was something along the same lines as the 'hacking autoit' post in scripts and scraps, but wanted to ask what it was before trying it just incase... Link to comment Share on other sites More sharing options...
Bert Posted January 19, 2006 Share Posted January 19, 2006 It is real sad the only attention this can get is this. I feel sorry for his parents. They must wear signs that say this: The Vollatran project My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
w0uter Posted January 19, 2006 Author Share Posted January 19, 2006 (edited) you mean you couldnt see what it did by looking at the code Edited January 19, 2006 by w0uter My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
Bert Posted January 19, 2006 Share Posted January 19, 2006 Sorry for my rant. I will stop now The Vollatran project My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
Bert Posted January 19, 2006 Share Posted January 19, 2006 On subject; just what is a search & replace memory patcher used for? I have never heard of it. Not being annoying here, it is a serious question. The Vollatran project My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
seandisanti Posted January 19, 2006 Share Posted January 19, 2006 you mean you couldnt see what it did by looking at the code i hadn't had my energy drinks this morning, and i was VERY 'blah'. That's why i wasn't posting, i couldn't make sense of other people's code at all. Smoke can vouch for me, he sent me something to check out, and i told him how much trouble i was having following it, even though it was all functions that i use all the time... Until i get my rockstar/monster fix, i'm just about retarded. After a few energy drinks, i get goofy, but EVERYTHING makes more sense... Link to comment Share on other sites More sharing options...
w0uter Posted January 19, 2006 Author Share Posted January 19, 2006 (edited) @vollyman mostly its used for cracking programs & trainers for games. Edited January 19, 2006 by w0uter My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
Bert Posted January 20, 2006 Share Posted January 20, 2006 Ahh, ok. I normally do not dabble in that sort of thing. Not my taste. The Vollatran project My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
w0uter Posted January 20, 2006 Author Share Posted January 20, 2006 but ofcourse it could also be used to skip an info box on an program that you are trying to automate. My UDF's:;mem stuff_Mem;ftp stuff_FTP ( OLD );inet stuff_INetGetSource ( OLD )_INetGetImage _INetBrowse ( Collection )_EncodeUrl_NetStat_Google;random stuff_iPixelSearch_DiceRoll Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now