Out of curiosity and in hope to learn more about binary patching I've attempted to follow the manual patching guide for webui_invincibility (with Cutter 1.12.0).
I can find the correct string and copy its adress (0x003bf809).
But "axt @ 0x003bf809" won't report any references at all.
So with the steps provided it's not possible to find the correct function.
I've tried the addresses of other strings successfully (e.g. "Supplicant interface already enabled and valid, but reconnecting just in case"). So I believe it is not a mistake in how I've entered the command.
It's great that you have your approach documented. A great practical learning resource :) Thanks!
Out of curiosity and in hope to learn more about binary patching I've attempted to follow the manual patching guide for webui_invincibility (with Cutter 1.12.0).
I can find the correct string and copy its adress (0x003bf809).
But "axt @ 0x003bf809" won't report any references at all. So with the steps provided it's not possible to find the correct function.
I've tried the addresses of other strings successfully (e.g. "Supplicant interface already enabled and valid, but reconnecting just in case"). So I believe it is not a mistake in how I've entered the command.
It's great that you have your approach documented. A great practical learning resource :) Thanks!