目标:
1、分析动作数组
2、分析攻击与打坐
思路:
通过选中对象逆向回溯出动作数组
通过动作对象访问逆向回溯到攻击CALL附近
封包断点bp WSASend
225F5050
225F5298
225F54E0
//背包对象 怪物对象 动作对象 玩家对象
0061BD29 |. BE 40E71C03 MOV ESI,Client.031CE740
//动作对象数组
dd [31A9A98]+410+4*0
0079D2CF - 80 B8 30020000 00 - cmp byte ptr [eax+00000230],00
0079D2D6 - 75 6D - jne Client.exe+39D345
0079D2D8 - 8B 8C 9F 10040000 - mov ecx,[edi+ebx*4+00000410] << 从这里 F8单步步过跟
0079D2DF - 85 C9 - test ecx,ecx
0079D2E1 - 74 62 - je Client.exe+39D345
0079DB98 - 83 BF 08160000 35 - cmp dword ptr [edi+00001608],35
0079DB9F - 75 1F - jne Client.exe+39DBC0
0079DBA1 - 8B 84 9F 10040000 - mov eax,[edi+ebx*4+00000410] <<
0079DBA8 - 85 C0 - test eax,eax
0079DBAA - 74 14 - je Client.exe+39DBC0
0079DB2E |. /E9 D9000000 JMP Client.0079DC0C
0079DB33 |> |83F8 FF CMP EAX,-1
0079DB36 |. |0F84 D0000000 JE Client.0079DC0C
0079DB3C |. |50 PUSH EAX
0079DB3D |. |6A 01 PUSH 1
0079DB3F |. |6A 00 PUSH 0
0079DB41 |. |8BCF MOV ECX,EDI
0079DB43 |. |E8 B80FFFFF CALL Client.0078EB00
0079DB48 |. |E9 BF000000 JMP Client.0079DC0C
0079DB4D |> |8B8F 08160000 MOV ECX,DWORD PTR DS:[EDI+1608]
0079DB53 |. |8B97 D01B0000 MOV EDX,DWORD PTR DS:[EDI+1BD0]
0079DB59 |. |53 PUSH EBX
0079DB5A |. |51 PUSH ECX
0079DB5B |. |52 PUSH EDX
0079DB5C |. |8BCF MOV ECX,EDI
0079DB5E |. |E8 9D0FFFFF CALL Client.0078EB00
0079DB63 |. |E9 A4000000 JMP Client.0079DC0C
0079DB68 |> |E8 A3B2F2FF CALL Clien
1、分析动作数组
2、分析攻击与打坐
思路:
通过选中对象逆向回溯出动作数组
通过动作对象访问逆向回溯到攻击CALL附近
封包断点bp WSASend
225F5050
225F5298
225F54E0
//背包对象 怪物对象 动作对象 玩家对象
0061BD29 |. BE 40E71C03 MOV ESI,Client.031CE740
//动作对象数组
dd [31A9A98]+410+4*0
0079D2CF - 80 B8 30020000 00 - cmp byte ptr [eax+00000230],00
0079D2D6 - 75 6D - jne Client.exe+39D345
0079D2D8 - 8B 8C 9F 10040000 - mov ecx,[edi+ebx*4+00000410] << 从这里 F8单步步过跟
0079D2DF - 85 C9 - test ecx,ecx
0079D2E1 - 74 62 - je Client.exe+39D345
0079DB98 - 83 BF 08160000 35 - cmp dword ptr [edi+00001608],35
0079DB9F - 75 1F - jne Client.exe+39DBC0
0079DBA1 - 8B 84 9F 10040000 - mov eax,[edi+ebx*4+00000410] <<
0079DBA8 - 85 C0 - test eax,eax
0079DBAA - 74 14 - je Client.exe+39DBC0
0079DB2E |. /E9 D9000000 JMP Client.0079DC0C
0079DB33 |> |83F8 FF CMP EAX,-1
0079DB36 |. |0F84 D0000000 JE Client.0079DC0C
0079DB3C |. |50 PUSH EAX
0079DB3D |. |6A 01 PUSH 1
0079DB3F |. |6A 00 PUSH 0
0079DB41 |. |8BCF MOV ECX,EDI
0079DB43 |. |E8 B80FFFFF CALL Client.0078EB00
0079DB48 |. |E9 BF000000 JMP Client.0079DC0C
0079DB4D |> |8B8F 08160000 MOV ECX,DWORD PTR DS:[EDI+1608]
0079DB53 |. |8B97 D01B0000 MOV EDX,DWORD PTR DS:[EDI+1BD0]
0079DB59 |. |53 PUSH EBX
0079DB5A |. |51 PUSH ECX
0079DB5B |. |52 PUSH EDX
0079DB5C |. |8BCF MOV ECX,EDI
0079DB5E |. |E8 9D0FFFFF CALL Client.0078EB00
0079DB63 |. |E9 A4000000 JMP Client.0079DC0C
0079DB68 |> |E8 A3B2F2FF CALL Clien

最低0.47元/天 解锁文章
52

被折叠的 条评论
为什么被折叠?



