💾 Archived View for spam.works › mirrors › textfiles › hacking › hackerdoc.txt captured on 2023-06-14 at 16:50:44.

View Raw

More Information

-=-=-=-=-=-=-

                                Hacker 1.0
                          by WadeSoft, March 1994


Disclaimer

This program has been added to the World's collection of public domain utilites.
It is a free utility, and therefore neglecting the cost of diskette(s), no price is to be
entailed with its distribution. 

Purpose
     
This program was created as a programming aid: to help WadeSoft decipher
various file formats, such as .WAV and .TGA files. It can be used for this purpose
as well as another - to help gamers "cheat". As well as a programmers' best friend,
this utility can be also be the gamers' most valued program.

Program Outline

Hacker was designed with four distinct goals in mind. These four functions, which
are performed on either textual or binary (.exe) files, can be categorized in the
following manner:

     a.   Numeric/character search.
     b.   Numeric/character search and replace.
     c.   Numeric/character modification.
     d.   File comparison.

Numeric/Character Search Explained

This is probably the single most useful part of Hacker's functions in the eyes of a
programmer. It allows the user to search an entire file (textual or binary) for a
given byte, integer, word, long integer or sequence of characters. Upon finding an
occurrence of the specified value, the program will display it's location inside the
file. We used this function to understand the .TGA file format. We knew our image
was 640 pixels wide and 480 long, so we searched for the "word" (see "Data Types
Explained") "640" inside the file. It told us it's exact location. Upon acquiring this
knowledge, our program was able to know the resolution of any image we wanted,
not just this particular one. The point is that we can now take more complete
advantage of the .TGA file format.   

Numeric/Character Search and Replace

When selection what one wants to search for in a file, the program asks if the user
wants to do any replacing after the values have been located. If so, then the
program asks what to replace the values with. Then it begins the search, and when
any identical values are located, the program asks if the user wants the value at this
particular location replaced. If yes is answered, the program replaces the located
value with the desired one. This is useful for cheating in games. If one knew that
he or she had $540 dollars in a game, they could search their save-game file for
540, and if it were found, it could be replaced with $10,000!

Numeric/Character Modification

When searching for a value, let us say $540 in a saved game, the program will
display the location of its findings. Instead of doing a Search/Replace every time
the user wanted to change his or her money in the game (and therefore knowing
exactly how much money he/she had at the time), the user could just specify the
location of the value to change, and change it to $20,000. The gamer would
hopefully have written down the location inside the file where the money was
stored.

File Comparison

Almost always, saved game files are of a constant length. This would indicate that
game-related information (such as money) is always stored in the same location.
File comparison is only useful for which are of the same length. The reason is that
the program reports every byte which is different between the two specified files.
If one were larger than the other, each addition byte would be reported, making for
a huge list of meaningless differences. Let us say that in a role-playing game, we
saved the game just prior to and just after having changed our sword for an axe.
If a file comparison were performed between the two saved-game files, these
changed would be revealed. The user would then know to change byte 45 to value
32 if he wants an axe or value 31 if he wants a sword. What happens when we
change it to 56? A halberd perhaps? After having made a comparison, it is best to
use the "File Modification" tactic to alter these values. Note that it is useful to
create lists of weapons or spells along with their associated byte values and
locations. Include your list and this program together in a package, and distribute
it them!

Data Types Explained (simplified)

A small amount of "programming" knowledge is required if one wants to use this
program. The reason is simple. Because this software functions with ALL types of
files and games, no preset locations or file definitions are known to the utility. In
other words, the user must specify the type of data he is searching for. Data is
stored in several different manners, and below is posted a listing of the different
data types this program supports (which is virtually all of them). If you are
unfamiliar with programming, or more specifically with data storage, here is a brief
explanation. 

A file is composed of a certain number of bytes. Let us take a 64 kilobyte file as
an example. 64k represents 64,000 bytes of information (approximately, since in
computerese kilo stands for 1024, which yields 65,536 bytes). A number between
the range of 0 and 255 (256 possible numbers) requires 1 byte of storage space. If
in your saved game, the value you are searching for cannot exceed 255, then it is
likely to have been stored as a byte value. If your numbers get larger than this (say
money, of which you have $4,000), then it has not been saved as a byte value. It
has probably been saved as something larger, say a word. A word is composed of
two bytes placed side-by-side. These can hold numbers as large as 65,536. If you
think about it this makes sense, since 256 (largest value for a byte-value) multiplied
by 256 gives you 65,536. Though bytes are usually considered to be the smallest
units, they are not. No file can be smaller than 1 byte, but one byte is actually
composed of 8 bits. Here is a description of how the number 341 is stored in
memory. Note that this is larger than 255, so must be stored as a word. 


0    0    0    0    0    0    0    1    0    1    0    1    0    1    0    1
2^15 2^14 2^13 2^12 2^11 2^10 2^9  2^8  2^7  2^6  2^5  2^4  2^3  2^2  2^1  2^0

Please note than "2^15" Indicates 2 to the power of 15. If one wants to change this
base-2 number to base-10, one needs to find the "1's" in the upper row, and for
each of these, add the number represented below it. 341 would be 2^8 + 2^6 + 2^4
+ 2^2 + 2^0 = 341. Notice that there are 16 elements, or in other words, 16 bits.
This means two bytes side-by-side as was described above. This was called a
"word". We said that 65,536 was the largest number which could be represented
by a word. Is this true? Assume a "1" for each of the cells above, and you should
get 65,535. Why are we missing 1? Because "0" is a number, and thus, we can
store 65,536 numbers, of which the largest is 65,535.

 
Data Type      Stored Bytes   Stored Bits    Smallest  Biggest
Byte           1              8              0         255
Character      1              8              ASCII #0  ASCII #255
Word           2              16             0         65,535
Integer        2              16             -32767    32767
Long Integer   4              32             -2.15bil  2.15bil

Using the Program

Throughout this documentation there have been several explanations and examples,
but none formalized. Here we will present to you one formal example of cheating.
Origin's Privateer is quite a popular game now, and so we thought we'd show you
how to "help" you along in the game. Load up a saved game and check to see how
much money you have. Let us say you have $5200 credits exactly. Quit the game
and load up Hacker. It is best to place hacker in your path statement so you can
access it from anywhere, though this is not required. From the main menu, choose
option 4, which is "long int". We know we can have a lot of money, so we assume
the information is stored as a long integer (see table above). The program will then
prompt you for the name of the file. Enter it. They it will ask you if you want to
search the file. Say yes here. If you knew the location of the byte to modify, then
you would say no here. The utility will then ask you what you want to search for.
Enter $5200 here. The program will then as you if you want to replace any of the
values you find. Enter yes if you want to actually change your money. It will then
ask you what your desired value is. Enter 20,000. The program will then begin to
scan the file. If any matches were found, the program will tell you where it found
the occurrence. It will then ask you if you want to replace this value with the
desired quantitiy of cash you entered previously. If yes, then the change will be
made. Hit "y". You have now made some good money without much effort!

Generally, all information related to your character rather than to the map of the
game is stored at the beginning of the file. If a second or third match is made for
$5,200, it is probably fluke. It is generally best to accept only the first occurrence,
and to ignore the following ones. 

Contacting WadeSoft

WadeSoft is at the moment a small shareware-oriented company dedicated to
releasing useful programs to the public domain. In other words, the little utilities
we write to help us write our larger programs are released as public, whereas we
ask for some money for the larger ones!

WadeSoft runs a public/private bulletin board called The Spinning Disk at the
following number: 416-447-9233 (416-447-WADE). If private access is desired
(access to files and the other telephone lines) then the nominal fee of $15.00 is
asked. You do not need to register ($15.00) with the Spinning Disk to obtain
WadeSoft technical help. To do so, please leave a comment to the System Operator
detailing your problem(s). That is option "C" at the main menu. 

Registration

Registration of any WadeSoft product is mearly $10.00 US or $12.50 Canadian.
Registration simply means that you receive a diskette in the mail, along with nicely
printed and formatted documentation. Please indicate your mailing address,
telephone number and diskette type in the envelope. By sending $25.00 ($30.00
CND), you will receive a copy of ALL our programs, along with their respective
documentations. In order to minimize our costs however, all programs will be
contained on one or two diskettes, rather than having a each program contained
individually.

Mailing Address

Please mail cheques to the following address, and make cheques payable to
"Gregory Wade".

Gregory Wade
26 Farrington Drive
North York, On, Canada
M2L 2B6