Jump to content
Araştır
  • Diğer seçenekler ...
Sonuçları bul ...
Sonuçları bul ...

martin123ko

Uzaklaştırılmış
  • İçerik sayısı

    50
  • Katılım

  • Son ziyaret

  • Puan

    1,014 [ Bağış Yap ]

martin123ko kullanıcısının paylaşımları

  1. Teşekkürler!
  2. Teşekkürler Mewtwo!
  3. Unfortunately I don't have any PUS. Sorry. Maybe someone probably shared in the forum something. -- mesaja ek olarak -- Mewtwo is right :) Example: void CUser::ItemUpgrade(Packet & pkt, uint8_t nUpgradeType); int nReqOriginItem = nItemID[0] % 1000; _ITEM_UPGRADE * pUpgrade = nullptr; foreach_stlmap (itr, g_pMain->m_ItemUpgradeArray) { // beginning of foreach pUpgrade = itr->second; if (pUpgrade->sOriginItem != nReqOriginItem) continue; if ((nItemID[0] / MIN_ITEM_ID) != pUpgrade->nIndex / 100000 && pUpgrade->nIndex continue; if( nItemID[1]== 700002000 || nItemID[2]== 700002000 || nItemID[1]== 379258000 || nItemID[2]== 379258000) trina = true;//How many trina did I put there ? .............. As you can see, to find the ID in ITEM table, we always need the Base ID, so we take the full Item ID: int nReqOriginItem = nItemID[0] % 1000; So if 180410899 % 1000 = we get 899, so we then know what to look for in the ITEM_UPGRADE and the client know which item to grab from the *_ext.tbl. So your base ID = 180410000 and Ext ID = 899. To make things work right, make sure your id's are properly synced.
  4. If you have any questions, feel free to post them in this topic. I can definitely help you with some SQL queries or maybe provide some information of how to solve your problem. My way of learning instead of looking for documentation, is to compare with things that are working. So for example, in your case you had problem with only some items that stuck at +8, then you can search for records in your database and client of items that their upgrades are already working. That way you figuring out what to change and once you get sharp in that, the next records would be easy for you.
  5. I would gladly help you for free here, as It's a lot of manual work to go through these database records and compare with your client. I think all you need is a little bit of direction how to get started. I'm learning myself the development side of KO, but since I have coding experience, I guess It's not very difficult for me to catch up. But you can still learn these things without coding skills, so don't lose hope so fast :)
  6. What version are you using? Make sure you .tbl files in client and ITEM, ITEM_UPGRADE are all synced. I mean by the ID's and _ext.tbl
  7. Teşekkürler
  8. Ben de RE öğreniyorum. Bu yazıyı paylaştığınız için teşekkür ederiz! -- mesaja ek olarak -- Maalesef linkler öldü.
  9. Gerçekten okumaktan zevk aldım. Paylaşım için teşekkürler!
  10. Bilginizi paylaştığınız için teşekkür ederiz Mewtwo!
  11. Harika bir iş ve paylaşım için teşekkürler! :)
  12. martin123ko

    Unpack 1299 ASProtect

    test -- mesaja ek olarak -- Oh...I can comment now. Interesting. Because before it didn't let me saying I have to wait some time before I can post again. :) Thanks for the input! But I believe the issue atm is not with HackShield, there is some other problem with the way the stripper unpacked the exe. Maybe some stolen bytes code for API calls. Not sure what exactly. And I already patched the HackShield call in the WinMain but it didn't help. The fact that also when I unpacked the Launcher.exe and the launcher doesn't require any additional patches, the launcher won't work. I also tried to manually fix the entry point where it makes this call: 00676219 | 0000 | add byte ptr ds:[eax],al | 0067621B | 0000 | add byte ptr ds:[eax],al | 0067621D | 0000 | add byte ptr ds:[eax],al | 0067621F | 0000 | add byte ptr ds:[eax],al | 00676221 | 0000 | add byte ptr ds:[eax],al | 00676223 | 0000 | add byte ptr ds:[eax],al | 00676225 | 0000 | add byte ptr ds:[eax],al | 00676227 | 0000 | add byte ptr ds:[eax],al | 00676229 | 0000 | add byte ptr ds:[eax],al | 0067622B | 0000 | add byte ptr ds:[eax],al | 0067622D | 0000 | add byte ptr ds:[eax],al | 0067622F | 0000 | add byte ptr ds:[eax],al | 00676231 | 0000 | add byte ptr ds:[eax],al | 00676233 | 0000 | add byte ptr ds:[eax],al | 00676235 | 0000 | add byte ptr ds:[eax],al | 00676237 | 0000 | add byte ptr ds:[eax],al | 00676239 | 0000 | add byte ptr ds:[eax],al | 0067623B | 0000 | add byte ptr ds:[eax],al | 0067623D | 0000 | add byte ptr ds:[eax],al | 0067623F | FF15 90316A00 | call dword ptr ds:[] | Because the stripper doesn't make the entry point look like a regular entry point as it should. So I patched it like this: 00676219 | 55 | push ebp | 0067621A | 8BEC | mov ebp,esp | 0067621C | 6A FF | push FFFFFFFF | 0067621E | 68 68E36A00 | push knightonline.6AE368 | 00676223 | 68 44606700 | push knightonline.676044 | 00676228 | 64:A1 00000000 | mov eax,dword ptr fs:[0] | 0067622E | 50 | push eax | 0067622F | 64:8925 00000000 | mov dword ptr fs:[0],esp | 00676236 | 83EC 58 | sub esp,58 | 00676239 | 53 | push ebx | 0067623A | 56 | push esi | esi:EntryPoint 0067623B | 57 | push edi | edi:EntryPoint 0067623C | 8965 E8 | mov dword ptr ss:[ebp-18],esp | 0067623F | FF15 90316A00 | call dword ptr ds:[] | Which is how a regular entry point should look like. That's is why I wonder why it doesn't work well with the stripper :( Even VirusTotal says it's quiet infected, which I know it's probably a false positive, but still, I think a clean manual unpack should solve all this problems and I'll need to dig more to get there. If I'll succeed, I'll also share it here in the forums, because it would be nice to finally have a clean unpacked 1299 KnightOnLine.exe and Launcher.exe without the annoying false positive detection. Any input from you guys would be highly appreciated. Thanks again!
  13. Hello Everyone, I made Windows XP VM and used PENTAGRAM: https://www.kodevelopers.com/unpack-amp-bypass-reverse-engineering/1101-aspack-asprotect-unpacker-stripper-v207211-rc2-213b9.html ASProtect unpacker to unpack the Launcher.exe and KnightOnLine.exe of version 1299. There are 3 Folders there: * Stripper_v213b9 * Stripper.v2.11.RC2 * Stripper.v2.07 When I tried Stripper.v2.11.RC2, the unpacking failed. When I tried Stripper.v2.07, the VM got BSOD(Blue Screen of Death). When I tried Stripper_v213b9, the unpacking worked! But for some reason the produced unpacked executable doesn't work well, even the launcher. What could be the reason? I even tried ImpREC 1.7e to fix the imports and also Scylla_v0.9.8, but when I click the exe, nothing happens. I checked the entry point OEP with x64dbg and it looks good: 0x0067623F Is there any better way to unpack ASProtect? Like the manual way using x64dbg? and then manually fix the imports without counting on some tool or script to do the job for me? I can unpack later ASProtect versions manually, but the old 1.22 1.23 beta for some reason I'm having trouble finding the OEP. I appreciate any help! Thanks in advance 🙂 Regards, Martin Brooker
  14. martin123ko

    KO Server Project V2083

    Teşekkürler! 🙂
  15. This is great! I always used GoatCheez TBL Editor. Good work and thanks for sharing! :)
  16. martin123ko

    List of Tools for Developers

    Thanks for the input @ hayalc, I always got confused with this one. Very helpful :) I hope it's ok if I ask here, but is the N3FXE allow you to also edit existing bundles(.fxb)?
  17. martin123ko

    Armor

    You can use the N3TexViewer tool to export these DXT's for the armors you trying to modify and adjust the colors. Same as my previous answer. :)
  18. Üye adı: martin123ko Ad ve Soyad: Martin Brooker Ülke / Şehir: Sweden Hakkınızda kısa bilgi: Junior Java/SQL Software Developer and a Student E-posta adresiniz: [email protected] Skype adresiniz: martin.brook Facebook adresiniz: Not using Referans olan üye: Ne kadar süredir Knight OnLine ile ilgileniyorsunuz?: Been playing KnightOnline ProjectKO and ApexKO Aktif olarak Knight OnLine oynuyor musunuz?: Yes Oynuyorsanız, hangi sunucuda?: ProjectKO, ApexKO and sometimes GlobalKO Yetkinlikleriniz, becerileriniz nelerdir?: Database Design and SQL Önceki çalışmalarınız, referanslarınız: Marketing in UI/UIX company Ek Bilgiler: Interested in learning the KO development side. IP Address:: 31.13.191.148
×
×
  • Yeni Oluştur...