[R-CON]Mats391 wrote:I have some assembly hacking stuff already set up for linux servers. I can help if you want.
Would really appreciate, but is it possible to say the commands you need to look for?
In windows the first function is this:
Code: Select all
0066BA40 PUSH EBP
0066BA41 MOV EBP,ESP
0066BA43 MOV EDX,DWORD PTR SS:[EBP+C]
0066BA46 TEST EDX,EDX
0066BA48 JL SHORT BF2.0066BA86
0066BA4A CMP EDX,8
0066BA4D JGE SHORT BF2.0066BA86
0066BA4F MOV EAX,DWORD PTR SS:[EBP+8]
0066BA52 TEST EAX,EAX
0066BA54 JL SHORT BF2.0066BA86
[b][color=Red]0066BA56 CMP EAX,40[/color][/b]
0066BA59 JGE SHORT BF2.0066BA86
0066BA5B LEA EAX,DWORD PTR DS:[EDX+EAX*8]
0066BA5E LEA EDX,DWORD PTR DS:[EAX*8]
0066BA65 SUB EDX,EAX
0066BA67 CMP DWORD PTR DS:[ECX+EDX*4+50C],10
0066BA6F LEA EAX,DWORD PTR DS:[ECX+EDX*4+4F4]
0066BA76 JB SHORT BF2.0066BA7F
0066BA78 MOV EAX,DWORD PTR DS:[EAX+4]
0066BA7B POP EBP
0066BA7C RETN 8
0066BA7F ADD EAX,4
0066BA82 POP EBP
0066BA83 RETN 8
0066BA86 XOR EAX,EAX
0066BA88 POP EBP
0066BA89 RETN 8
And the second change is in a mix of very long loops.
Code: Select all
0066C508 MOV EDX,DWORD PTR SS:[EBP-24]
0066C50B |MOV EAX,DWORD PTR DS:[EDX]
0066C50D MOV ESI,DWORD PTR SS:[EBP-44]
0066C510 MOV DWORD PTR SS:[EBP-24],EAX
0066C513 MOV EAX,DWORD PTR SS:[EBP-28]
0066C516 ADD EAX,1
0066C519 ADD EBX,0E0
[b][color=Red]0066C51F CMP EAX,40[/color][/b]
0066C522 MOV DWORD PTR SS:[EBP-28],EAX
0066C525 JL BF2.0066C379
0066C52B MOV ECX,DWORD PTR SS:[EBP-28]
0066C52E MOV DWORD PTR DS:[EDI+4F0],ECX
0066C534 MOV EAX,DWORD PTR DS:[ESI]
0066C536 CMP EAX,ESI
0066C538 MOV DWORD PTR DS:[ESI],ESI
0066C53A MOV DWORD PTR DS:[ESI+4],ESI
0066C53D JE SHORT BF2.0066C551
0066C53F NOP
If you could find this in Linux would be awesome.