Jump to content

7 posts in this topic

Recommended Posts

Posted

I am not that great at updating offsets. I'm trying to update cheats for Brave Frontier 1.2.2 to 1.2.4, and I'm starting off with Brave Burst Fill. I am using the quick/simple method using IDA to open up the two binaries and text searching the functions to find similar matches, then using the same hex edits to make it work, only it doesnt. What am I doing wrong? Are they not the same? :o any tips will surely help :geek: I changed the hex to 64 20 70 47

 

You can side by side compare the two in Imgur or check them out yourself: BINARY FOR 1.2.2 & 1.2.4

 

Alternatively the screenshots are provided below

 

1.2.2 IDA View

cTzro6a.png

 

1.2.4 IDA View

RNMAFKO.png

 

1.2.2 Hex View

6Q5J3B2.png

 

1.2.4 Hex View2LvJzJC.png

Posted

Lol

 

Hex Compring and Updating is the worst way ever, there could be some similar stuff in binary, u never know

 

So just use strings method , how did u find the function in 1.2.2, use the same way

Posted (edited)

Lol

 

Hex Compring and Updating is the worst way ever, there could be some similar stuff in binary, u never know

 

So just use strings method , how did u find the function in 1.2.2, use the same way

Bro, you give me too much credit. I'm still learning. Another guy found those, I used to work with the guy 'cause he didn't have an iPhone :p So I'm trying to update those :D

Updated by Javi Tech
Posted

Lol

 

Hex Compring and Updating is the worst way ever, there could be some similar stuff in binary, u never know

 

So just use strings method , how did u find the function in 1.2.2, use the same way

 

I respectfully disagree. Ultimately, even via strings, you'd be led to functions that seem similar because similar functions can reference the same string. Finally for BF (at least for 1.2.2), strings are referenced dynamically so they don't show up as cross references in IDA. Strings method can work but it'll be as tedious as hex comparing.

Posted (edited)

@@Javi Tech here's how you do it

 

 

Open up both binarys side by side

 

Jump (in the old binary) to the offset that you have (g)

Next copy something around it that is uniqueish (like the CMP r2, #0)

Then jump to the old offset in the new binary (It's closser to the new one)

Then search (alt +t) that (start with down) and find a function that looks like the graph view of the old function and it has the same arm code.

If you can't find it with down, then jump in the new binary hack to the old offset and search ip, or search something else

There you go

 

Credit: Lawivido (just taught me like 2 min ago)

 

@@ZahirSher This is a lot better then hex compare ;)

Updated by Gh0stByte

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines