Jump to content
GIGN Forum

Hlds Exploit Fix V2


Recommended Posts

Protocol version 48
Exe version 1.1.2.6 (cstrike)
Exe build: 14:21:06 Mar  8 2010 (4554)

SV_ReadClientMessage: unknown command char (102)
Dropped 3VMajq from server
Reason:  Bad command character in client command

 // EXPLOIT
01DAB4F2     A1 D04D1202    MOV EAX,DWORD PTR DS:[2124DD0]
01DAB4F7     85C0           TEST EAX,EAX
01DAB4F9     74 34          JE SHORT swds.01DAB52F
01DAB4FB     E8 D0B4F8FF    CALL swds.01D369D0
01DAB500     50             PUSH EAX
01DAB501     8D85 00FFFFFF  LEA EAX,DWORD PTR SS:[EBP-100]
01DAB507     50             PUSH EAX
01DAB508     E8 139FF8FF    CALL swds.01D35420
01DAB50D     83C4 08        ADD ESP,8
01DAB510     E8 BBB4F8FF    CALL swds.01D369D0
01DAB515     8B5D 08        MOV EBX,DWORD PTR SS:[EBP+8]
01DAB518     8BF8           MOV EDI,EAX

// CRACK (STEAM_ID_LAN)
01D9892B     EB 18          JMP SHORT swds.01D98945

01DA0999     90             NOP
01DA099A     90             NOP

01DA60EB     EB 3F          JMP SHORT swds.01DA612C

swds.zip

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...