flat assembler
Message board for the users of flat assembler.
Index
> Windows > Position Independent Code |
Author |
|
vid 09 Dec 2007, 13:33
Code: delta: ... var dd ? ... mov [ebp + (var-delta)], 10 |
|||
09 Dec 2007, 13:33 |
|
DBS2007 09 Dec 2007, 13:40
Nice. Let the assembler do the calculating.
I think this is as good as it can get. Thanks vid. |
|||
09 Dec 2007, 13:40 |
|
vid 09 Dec 2007, 14:13
You're welcome.
I just hope you aren't writing something as lame as malware, to annoy few thousand of people... |
|||
09 Dec 2007, 14:13 |
|
DBS2007 09 Dec 2007, 14:16
Nah, im writin hacks for games.
|
|||
09 Dec 2007, 14:16 |
|
LocoDelAssembly 09 Dec 2007, 15:23
If the things starts to be too much complicated you can inject a DLL instead. http://www.edgeofnowhere.cc/viewtopic.php?p=2483118
|
|||
09 Dec 2007, 15:23 |
|
DBS2007 09 Dec 2007, 16:02
Dlls are too easy to detect.
Injected Code like this, would look like a bunch of allocated unrelated data, that could origin from any Module in the process or the main module itslf. I have written a simple Metamorphic engine in Delphi, which will alter the Opcodes of the code to inject, so my hack is not prone to Signature-Scanning. The AntiCheat will have a hard time to detect this at all. |
|||
09 Dec 2007, 16:02 |
|
Ehtyar 09 Dec 2007, 20:10
You might want to have a google for "shellcode", there are some nice external links on wikipedia, but most of them are for malicious purposes. It should teach you some good tricks though.
Ehtyar. |
|||
09 Dec 2007, 20:10 |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2024, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.