If you press Enter and look at the messages sent in Spy++ you'll see that an enter keystroke consists of more then just WM_KEYDOWN
Type: Posts; User: ottizy
If you press Enter and look at the messages sent in Spy++ you'll see that an enter keystroke consists of more then just WM_KEYDOWN
Show us what you got so far and maybe someone can help.
I dont think that is the correct parameters. Show the registers and stack when you just call it normally.
I think the location parameters are pointers to location structures.
The simplest way for me to find these functions I described here: http://tpforums.org/forum/threads/6383-How-to-find-attackCreature-function-address?p=55642#post55642
However I found out after...
You cannot work around the data that the server sends to you. You can't tell what the server should or not send to you. Same reason why you cannot know for sure where invisible creatures are anymore.
http://tpforums.org/forum/threads/443-Tibia-GUI-structure
All of this is still applied if you are talking about the real tibia client.
Good thing about hacking otclient is that it is open-source. Maybe this will help https://github.com/edubart/otclient/blob/master/src/client/creatures.h#L139
Double linked list. A pointer to the first item in the queue and a pointer to the last item in the queue. Each item contains a pointer to next and previous item in the queue.
No those addresses are with baseaddress however I have no idea what the baseaddress is since ASLR was enabled while I made the screenshots. You are not looking for a function with 3 arguments, you...
Search for all intermodular calls
http://i.imgur.com/srmXjij.png
Find the ws2_32 send function
http://i.imgur.com/2Jdv4Yr.png
Follow the function by doubleclicking on it. Start the client...
Okay I'll try again. Why did you remove the WriteProcessMemory part?
If you're gonna copy pasta atleast copy pasta all of it :D
Both became NeoBot.
Concerning the attacking
http://tpforums.org/forum/threads/6254-Tibia-10-75-Attack-monster-in-my-Bot?p=54838
http://tpforums.org/forum/threads/1654-OllyDbg-Tutorial-Updating-Addresses
MAP_POINTER = 0xB72E24 - 0x400000;
These offsets are not constant. In fact these offsets is what would be our addresses.
So basically what you are saing is i.e. Baseadr + BLIST = BLIST.
I think so. Not 100% sure however.
Use __fastcall instead of __cdecl
I know that after an update there were no more information being sent about invisible creatures. I have however not checked in the recent updates so maybe they are sending it again. I highly doubt it...
As of the clients that were released in the previos 3-4(?) years, there's no way to make invisible creatures visible again as the server doesn't send any information about these creatures. It's...
The latest change to the map structure I can remember is the change in the item structure which made it 24 bytes. You should look into that
They are in base 16. It's VB syntax that is using "&H" instead of the C languages "0x".
So for example, LoginServerStartPointer=&H98B094 would be LoginServerStartPointer=0x98B094
Generally when you send data over internet, you encrypt it. It would be pretty easy to decrypt though since the encryption key is stored in the client
You can hook the winsock send function. All data in the newer clients will be encrypted however