cheaterguy234 How do I cheat?
Reputation: 0
Joined: 18 Apr 2014 Posts: 3
|
Posted: Sat Jan 10, 2015 3:00 pm Post subject: How can I find pointers? |
|
|
So I am messing around with a game called RaiderZ because it has no protection therefore I can use Cheat Engine without it closing and I am learning to find different values and such.
So far I have found teleport hack which is done by figuring out your XYZ coords and changing them. I've also got jump hack which just changes the jump value for all characters. I've also found SP (action bar) hack and skill point dupe hack.
The game is an online MMORPG and so whenever I reload the game all of the values change because it is not the base address. So I am trying to find the pointer for the SP value but I am struggling because whatever I try I get thousands of results.
So I've found the address which is responsible for the SP value in my current sessions.
Image: puu.sh/ekOwV/c314886abe.png
I right click it and select find out what writes to this address. I then perform an action so that my SP is reduced.
I am presented with these 2 values:
Image: puu.sh/ekP2F/000a0b8807.png
I figured out that the first one is when your SP is reduced and the second one is when it regenerates back to full.
I tried to read some tutorials to find the pointer value but I wasn't successful even so I learnt some things. [esi+260] 260 is the offset for the address. But what is esi? From the tutorials I read I was told to just look at the value for ESI so I did that and it says at the bottom that it was: ESI=06A4F260. I then started a new scan set it to 4 bytes and hex with exact value and I got 0 results.
So that wasn't working, next I tried to look in the disassembler to see if I could find the pointer.
Image: puu.sh/ekRX1/2b9d35fcfb.png
I saw mov esi,eax which I figured meant that it moves eax into esi from an earlier tutorial I read.
So for example, if I had a variable say byte actionbar = 0;
then what I thought mov esi,eax did was made actionbar = eax. I found out that eax is the maximum amount of SP you have, so I knew that and was able to change this mov [esi+00000260],edi to mov [esi+00000260],eax which made me not lose any SP at all.
But I still couldn't find the pointer for the address I found that changed the SP. I've also tried pointer scanner but that brings up 8 million results and even after hundreds of rescans it was still in the millions.
Can anyone please help?
|
|