Log in

View Full Version : Patching neolite...??


SpeKKeL
April 3rd, 2001, 05:04
Well i want to patch a prog. packed with neolite.
I don't want to use a process(memory)-patcher but a simple piece of code witch i can add to the end of the unpacking routine.So i wrote this and jumped to it just before it reache the oep.But when i try to write something to a memory address it craches..??
something wrong with my code ??
push eax
push ebx
mov eax,00e9 < the byte to patch
mov [405392],eax <patch on address < and here it
craches ???
Any solutions ?? Thanks....SpeKKeL...

Predator_PC^pGC
April 3rd, 2001, 05:25
1, you can just put code like: mov dword ptr [400320], 0A

instead of moving 0A in eax ..(just an example)

2, neolite uses the VirtualProtectEx windows api to protect the memory from being overwritten by your code.. so, what you have to do is find the place in the file where it calls that api and jump right over it (there's a JNZ right in front of it if I'm not mistaken)... beware, there is more than 1 instance of VirtualProtectEx ;=)

should be enough info...
greets,
Predator [PC/pGC]

SpeKKeL
April 4th, 2001, 16:13
Hi Predator,

Yep verry usefull info !!
I inserted my patch right after when the Bytes are written in memory(unpacked),So i didn't had any trouble
with the virtualprotect calls....(cause jumping over them gave a lot's of errors)

Greetz and Thanks again,
.........................SpeKKeL........