Project 1999

Project 1999 (/forums/index.php)
-   Red Rants and Flames (/forums/forumdisplay.php?f=55)
-   -   Player hacking still in pvp (/forums/showthread.php?t=53618)

Tamiah2011 11-05-2011 10:12 AM

Player hacking still in pvp
 
R99 and staff we still have a few player using some type of run hack, Had a few player outrunning a 50 lvl druid with there Jboots.Its either some type of run hack or a problem with programming, 50lvl sow should have np keeping up with jbppt speed unless it bard speed. 1 player was necro(gnome) and other player was a pally(Dwarf), maybe a short player issue...

PVPBetaChamps 11-05-2011 12:13 PM

could have been a dual core issue

wrong forum btw, dumb fuck

Bkab 11-05-2011 03:31 PM

tamiah here you go pal, please read this and follow the steps accordingly.
http://uncyclopedia.wikia.com/wiki/HowTo:Commit_Suicide

Naez 4.20 11-05-2011 04:30 PM

We have modified the Flower Power cheat engine.

http://img521.imageshack.us/img521/7996/28653676.jpg

CTRL+INS: Decrease Runspeed
CTRL+HOME: Increase Runspeed
CTRL+PgUp: Increase Z-Axis by 1
CTRL+PgDwn: Decrease Z-Axis by 1
CTRL+END: Turn on No Fall DMG
CTRL+DEL: Turn on zero gravity

PHP Code:

using System;
using System.Diagnostics;
using System.Runtime.InteropServices;

namespace 
ProcessMemoryReaderLib
{
    
/// <summary>
    /// ProcessMemoryReader is a class that enables direct reading a process memory
    /// </summary>
    
class ProcessMemoryReaderApi
    
{
        
// constants information can be found in <winnt.h>
        
[Flags]
        public 
enum ProcessAccessType
        
{
            
PROCESS_TERMINATE = (0x0001),
            
PROCESS_CREATE_THREAD = (0x0002),
            
PROCESS_SET_SESSIONID = (0x0004),
            
PROCESS_VM_OPERATION = (0x0008),
            
PROCESS_VM_READ = (0x0010),
            
PROCESS_VM_WRITE = (0x0020),
            
PROCESS_DUP_HANDLE = (0x0040),
            
PROCESS_CREATE_PROCESS = (0x0080),
            
PROCESS_SET_QUOTA = (0x0100),
            
PROCESS_SET_INFORMATION = (0x0200),
            
PROCESS_QUERY_INFORMATION = (0x0400)
        }

        
// function declarations are found in the MSDN and in <winbase.h> 

        //        HANDLE OpenProcess(
        //            DWORD dwDesiredAccess,  // access flag
        //            BOOL bInheritHandle,    // handle inheritance option
        //            DWORD dwProcessId       // process identifier
        //            );
        
[DllImport("kernel32.dll")]
        public static 
extern IntPtr OpenProcess(UInt32 dwDesiredAccessInt32 bInheritHandleUInt32 dwProcessId);

        
//        BOOL CloseHandle(
        //            HANDLE hObject   // handle to object
        //            );
        
[DllImport("kernel32.dll")]
        public static 
extern Int32 CloseHandle(IntPtr hObject);

        
//        BOOL ReadProcessMemory(
        //            HANDLE hProcess,              // handle to the process
        //            LPCVOID lpBaseAddress,        // base of memory area
        //            LPVOID lpBuffer,              // data buffer
        //            SIZE_T nSize,                 // number of bytes to read
        //            SIZE_T * lpNumberOfBytesRead  // number of bytes read
        //            );
        
[DllImport("kernel32.dll")]
        public static 
extern Int32 ReadProcessMemory(IntPtr hProcessIntPtr lpBaseAddress, [InOutbyte[] bufferUInt32 sizeout IntPtr lpNumberOfBytesRead);

        
//        BOOL WriteProcessMemory(
        //            HANDLE hProcess,                // handle to process
        //            LPVOID lpBaseAddress,           // base of memory area
        //            LPCVOID lpBuffer,               // data buffer
        //            SIZE_T nSize,                   // count of bytes to write
        //            SIZE_T * lpNumberOfBytesWritten // count of bytes written
        //            );
        
[DllImport("kernel32.dll")]
        public static 
extern Int32 WriteProcessMemory(IntPtr hProcessIntPtr lpBaseAddress, [InOutbyte[] bufferUInt32 sizeout IntPtr lpNumberOfBytesWritten);


    }

    public class 
ProcessMemoryReader
    
{

        public 
ProcessMemoryReader()
        {
        }

        
/// <summary>    
        /// Process from which to read        
        /// </summary>
        
public Process ReadProcess
        
{
            
get
            
{
                return 
m_ReadProcess;
            }
            
set
            
{
                
m_ReadProcess value;
            }
        }

        private 
Process m_ReadProcess null;

        private 
IntPtr m_hProcess IntPtr.Zero;

        public 
void OpenProcess()
        {
            
//            m_hProcess = ProcessMemoryReaderApi.OpenProcess(ProcessMemoryReaderApi.PROCESS_VM_READ, 1, (uint)m_ReadProcess.Id);
            
ProcessMemoryReaderApi.ProcessAccessType access;
            
access ProcessMemoryReaderApi.ProcessAccessType.PROCESS_VM_READ
                
ProcessMemoryReaderApi.ProcessAccessType.PROCESS_VM_WRITE
                
ProcessMemoryReaderApi.ProcessAccessType.PROCESS_VM_OPERATION;
            
m_hProcess ProcessMemoryReaderApi.OpenProcess((uint)access1, (uint)m_ReadProcess.Id);
        }

        public 
void CloseHandle()
        {
            
int iRetValue;
            
iRetValue ProcessMemoryReaderApi.CloseHandle(m_hProcess);
            if (
iRetValue == 0)
                throw new 
Exception("CloseHandle failed");
        }

        public 
byte[] ReadProcessMemory(IntPtr MemoryAddressuint bytesToReadout int bytesRead)
        {
            
byte[] buffer = new byte[bytesToRead];

            
IntPtr ptrBytesRead;
            
ProcessMemoryReaderApi.ReadProcessMemory(m_hProcessMemoryAddressbufferbytesToReadout ptrBytesRead);

            
bytesRead ptrBytesRead.ToInt32();

            return 
buffer;
        }

        public 
void WriteProcessMemory(IntPtr MemoryAddressbyte[] bytesToWriteout int bytesWritten)
        {
            
IntPtr ptrBytesWritten;
            
ProcessMemoryReaderApi.WriteProcessMemory(m_hProcessMemoryAddressbytesToWrite, (uint)bytesToWrite.Lengthout ptrBytesWritten);

            
bytesWritten ptrBytesWritten.ToInt32();
        }




    }



Smedy 11-05-2011 04:42 PM

notacult totally a cult

Tamiah2011 11-05-2011 11:55 PM

I am guessing more then half the player on R99 are using some type of hack program atm, It amazes me how fare people will go to cheat such a simple game.Waiting on the bann hammer for theses cheaters for good.

Bkab 11-06-2011 12:04 AM

i am guessing you have down syndrome, you were dropped on your head, your mother smoked and drank alcohol while pregnant with you, or you played with lead paint toys and ate paint chips as a kid. or all of the above.

Glam 11-06-2011 06:42 AM

Bkak is so ful of shit that no one even come close to be so stupid as him.... He most be the only one missing to get a brain when gud was dealing it out..... he just get a bottle ful of shit......

Rogean 11-06-2011 06:49 AM

Lol is that C#?

What a joke...

Smedy 11-06-2011 09:06 AM

Rogean checked your ones and zeros and laughed naez, that's what u get for tryin 2 be l33t


All times are GMT -4. The time now is 05:48 AM.

Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.