Jump to content

Aerospark

Members
  • Posts

    14
  • Joined

  • Last visited

  • Feedback

    0%

Posts posted by Aerospark

  1. Bit of a follow up to this, it is possible to access the random solvers before the login screen, onStart runs pretty much right away, but the login solver seems to be in RandomExecutor.otherSolvers instead of the standard solver map. I'm not sure if I can access this without using reflection, will edit this post with more info shortly.


    EDIT: Here's the code I eventually ended up using, it's a bit overboard, but it does work

     

    public void clearALLRandomHooksAndSolvers() throws IllegalAccessException, SecurityException, NoSuchFieldException{
            bot.getRandomExecutor().clearHooks(); // does nothing
            bot.getRandomExecutor().unregisterHook(RandomEvent.AUTO_LOGIN); // also does nothing
            RandomExecutor exec = bot.getRandomExecutor();
            Field other = exec.getClass().getDeclaredField("otherSolvers");
            other.setAccessible(true);
            ((Set<RandomSolver>)other.get(exec)).clear();
            Field solver = exec.getClass().getDeclaredField("solvers");
            solver.setAccessible(true);
            ((Map<RandomEvent, RandomSolver>)solver.get(exec)).clear();
            Field hooks = exec.getClass().getDeclaredField("hooks");
            hooks.setAccessible(true);
            ((Map<RandomEvent, RandomBehaviourHook>)hooks.get(exec)).clear();
    }
    
  2. Hey, just wondering if there’s a way to disable auto-login, whether it be in the settings or a way to specify it in the script. I couldn't find anything in the API docs, but I could have easily missed something.


    I'd mainly like to know because its important that my script uses it's own login handling code.

  3. Is there any way to disable this for development, aside from blacklisting the ad server hostname? I Could see it causing major issues with interface picking...


    I understand the need to have advertising, running a community isnt cheap, but there are some situations where it makes no sense. It's not like I'm going to click ads when im in the middle of creating content.




    /entitled rant

    • Like 1
  4. As far as I know OSBot does not xboot and instead injects into the gamepack and runs the game off that modified jar. Any Jagex requests they send out to detect whether there is injected code in the jar (such as getPlayer(), getCameraYaw(), etc.) are routed to the unmodified jars class loader.

     

    Also, it seems like you're confused about what xbooting actually is. It doesn't actually modify rt.jar but instead looks for rt.jar class overrides found with the xbooting jar file that it will use instead of the defaults. If you actually modified the rt.jar files you'd have to delete and reinstall Java since things relying on the default Java functionality wouldn't work (assuming you did something drastic to one of the classes).

     

    Interesting info ohmy.png thanks for explaining. Also, I was aware that Xboot works like that. The only reason I mentioned modifying rt.jar is because it's something I did myself "back in the day" with openjdk, I'm not sure if it supported -Xbootclasspath at the time. It does work "in a pinch," and breaking classes generally wasnt an issue because I had the full source of rt.jar

    Definitely not a good idea to actually use though, Xboot on the otherhand can be really usefull for getting into things.

    more obvious redundant statements

     

  5. No.

     

    You're botting, you will get banned.

    Well technically... my question was about running the client to scrape data, not botting.

    If I was banned, it would be for using 3rd party software or something like that, not macroing  I'd assume in more tiny text

    /nitpick

  6. I'm sure this has been asked before but it would be cool to have a more definitive answer, there's a lot of conflicting information out there.

    Anyway, is the OSBot client safe just by it's self? If I were to say, write a script that dumps all interface/object/NPC/ground item data, and played the game normally for a while through the client, is there any chance of getting banned for just that?


    More technically, does jagex actually check for "injection"? They could just as easily check for reflection (if people are meaning standard java.lang.reflect stuff.) If so, does OSBot and the like actively disable such checks?




    Yet more technobabble
    Also, does anyone know if any bot has tried editing rt.jar or used -Xbootclasspath to gain access to various objects used by the client?

  7. Not sure if this is ok to mention, but I think it needs to be:

    It's also really easy to crack wireless passwords, ESPECIALLY if they are WEP, I've got access to a few neighbouring routers for botting. (It's not very legal though, depending on where you live)


    If anyone's interested search aircrack-ng, I'd recommend using https://github.com/derv82/wifite, it makes things a lot easier. You should also change your computer's hostname to something that won't throw up red flags if someone sees it on the network. I've got mine set to "router"

×
×
  • Create New...