MultiClient

Discussion on Helbreath Hacks. New ones Released. and how to work them.
Post Reply
Chopper
just visiting
Posts: 1
Joined: Tue Jul 27, 2004 2:29 am

Post by Chopper »

hey all, i need a multiclient hack for a 3.51 server...i know its done by hexing so can someone supply me with a link or how to hex it?
Ozzie
<3 bd long time
Posts: 803
Joined: Wed Nov 12, 2003 3:20 am
Location: Australia
Contact:

Post by Ozzie »

hi, this really isnt the right section for this, in future please try to keep your posts in the appropriate sections.

*MOVED*
The Ozzie corperation banning people since 1856<br><br><a href='http://sigx.yuriy.net/link.php' target='_blank'><img src='http://sigx.yuriy.net/images/skin/Omega/0/xOzzie%60.png' border='0' alt='user posted image' /></a>
borgx
Member
Posts: 116
Joined: Tue Mar 23, 2004 6:53 am

Post by borgx »

well seeings how I have seen it in too many places all I will give you is it has a % and a 5 in it. Good luck.
<span style='color:purple'><br>Don't let the nick fool you! Anything is possible!<br><br><img src='http://img26.exs.cx/img26/6171/Majick.jpg' border='0' alt='user posted image' /><br><img src='http://img6.exs.cx/img6/4607/borgx1.jpg' border='0' alt='user posted image' /><br><img src='http://img42.exs.cx/img42/82/crusader.jpg' border='0' alt='user posted image' /><br><br></span>
binarydata
DBfiller
Posts: 3816
Joined: Fri Oct 31, 2003 5:30 am
Location: San Diego CA, USA
Contact:

Post by binarydata »

huhuhaha wrote: This is for those without any knowledge of asm.

1. unpack the helgame.exe if it is packed/protected. use ASPR Stripper
<a href='http://www.is.svitonline.com/syd' target='_blank'>http://www.is.svitonline.com/syd</a>
2. use a hex editor & edit the resulting unpacked _helgame.exe. Search for '0543kjg3j31%' (without the quote). Replace it with 00 hex value.
3. save it & there is your client with multi-client support.

This may not be the proper way to do it, but it is the simplest way for noob.
I'm not sure if every single hb is using the same '0543kjg3j31%'  for the mutex name. If you can't find the string the string then try find 'ERROR!'. The mutex name is after that. Or you can use debugger or api spy (boundcheck, apispy etc) to findout  the string used by monitoring openmutex/createmutex. Or use process viewing/listing programs that shows currently opened mutex of selected process.

For those with asm knowledge, you don't need any tutorial.
<img src='http://img88.exs.cx/img88/2290/7666.jpg' border='0' alt='user posted image' />
Post Reply