I have executable (written probably in c++), which is connecting to the serverside software using tcp and windows sockets (win sock api).
Then it sends packet with header (for example header is two bytes 0x0064), login and password. And then starts it's interaction with server.
I want to change login packet header, for example, from 0x0064 to 0x0065.
Of course I can always change it on my PC using sniffer like WPE (winsock packet editor), or I can write dll using Microsoft Detours with socket send function wrapper, and inject it before program launch, but I will have to check every packet that is going to be sent, to know that it has 0x0064 header and it's exactly the packet that I want to change.
So, my question is - is there any easy way to find variable with this packet header (I believe they just hard coded it when building packet, like in sprintf), and just to change one byte in HEX editor without learning the assembler? Maybe there is good tutorial/crackme example with solution that will explain how to do it?
Any advice will be helpful. Thanks!