How to add auto ban

Results 1 to 1 of 1
  1. #1
    Account Upgraded | Title Enabled! rhys918 is offline
    MemberRank
    Apr 2009 Join Date
    EnglandLocation
    377Posts

    How to add auto ban

    this isnt saying how to add it im on ollydbg can somone explain how to add it i dont know what its saying to do

    Code:
    start:
    	pushad
    	call getlocation
    getlocation:
    	pop ebp
    	sub ebp, getlocation-start
    	
    	mov ebx, [ebp+ (PatchLocation - start)]							; ebx contains the location of the where the patch will be placed
    	mov ecx, ebp
    	sub ecx, ebx
    	add ecx, (CodeToExecute - start - 5)  ; ecx has the jump position
    	mov [ebp + ((PatchMeCode-start) + 1)], ecx						; fix the jump
    	
    	push ebp
    	push 0x40
    	push EndOfPatchMeCode - PatchMeCode
    	push ebx
    	mov eax, [ebp+ (VirtualProtectAddress - start)]
    	call [eax]
    	mov esi, ebp
    	add esi, PatchMeCode - start
    	mov edi, [ebp+ (PatchLocation - start)]
    	mov ecx, EndOfPatchMeCode - PatchMeCode
    	rep movsb
    
    	; death glitch
    	mov ebx, [ebp+ (DeathGlitchPatchAddress - start)]
    	push ebp
    	push 0x40
    	push 6
    	push ebx
    	mov eax, [ebp+ (VirtualProtectAddress - start)]
    	call [eax]
    	mov [ebx], DWORD 0x90909090
    	mov [ebx], WORD 0x9090
    	
    
    	popad 
    	mov al,1
    	retn
    
    PatchLocation: dd 0x47dda0
    GetCurrentThreadIdAddress: dd 0x5e6120
    VirtualProtectAddress: dd 0x5e62f4
    WinsockSend: dd 0x5e65c4
    PacketStart: dw 0x66
    PacketSize: dw PacketEnd-PacketStart
    PacketID: dd 0xffffffb0
    PacketAnswer: dd  0x12345678
    PacketEnd: 
    DeathGlitchPatchAddress: dd 0x4B2EC9
    
    CodeToExecute:
            POP EAX
    	PUSH EAX
    	CMP	EAX, 0x00645000
    	JGE SHORT .deathjump
    	push ebp
    	call .nextline6
    .nextline6:
    	pop eax
    	sub eax, .nextline6 - start
    	mov ebp, eax
    	mov eax, [EBP + ( GetCurrentThreadIdAddress - start ) ]
    	call [eax]	; load thread id into eax
    	cmp DWORD [EBP + ( PacketAnswer - start )], 0x12345678 ; test if already set
    	jne .compareAnswer			 ; already set, jump to compare thread ids
    	mov [ebp + ( PacketAnswer - start) ], eax	; wasn't set, so its now set
    .compareAnswer:
    	cmp [ebp + ( PacketAnswer - start) ], eax  	; compare thread ids
    	pop ebp		
    	jne SHORT .deathjump 	; if the threads aren't equal, bail
    	mov eax,  [fs:0]
    	push -1
    	mov eax, 0x47dda8							; return jmp
    	JMP eax
    
    
    .deathjump:	
    	pushad					;== all pushed
    	call nextline5
    	nextline5:			
    	pop eax
    	sub eax, nextline5 - start
    	mov ebp, eax
    	mov eax, [EBP + ( GetCurrentThreadIdAddress - start ) ]
    	call [eax]
    	mov	[ ebp + ( PacketAnswer - start ) ], eax
    	mov eax, [esp + 8]
    	mov [ebp + PacketAnswer], eax
    	mov  eax, dword [0x203e06b]
    	push 0
    	push PacketEnd-PacketStart
    	mov ebx, ebp
    	add ebx, PacketStart
    	push ebx
    	push eax
    	mov eax, [ebp + WinsockSend]
    	call [eax]				; == all reset
    	popad
    ;;	push -1			// never fixed? Copied from another anti hack probably
    ;;	push 0x0056792d
    ;;	mov eax, 0x448e35
    ;;	jmp eax
    	push -1
    	mov eax, 0x47dda8							; return jmp
    	JMP eax	
    	RETN
    	
    PatchMeCode:
    	JMP 0x12345678
    	NOP
    	NOP
    EndOfPatchMeCode:




Advertisement