You're asking really good questions lately
.
Defeating HRADBA code #138 requires a bit of thought.
First of all- you need to use a hex editor or similar to force game.dll to load a copy of HRADBA.DLL on disk from somewhere other than inside the HRADBA.CBF file (so you can modify it later). It's very easy- just look for the call to LoadLibrary("hradba\actual\hradba.dll") and change it so that the string points to where you put a copy of this HRADBA.DLL file on disk.
Next- it makes sense that in order to detect a change in GAME.DLL or LOGS.DLL code (what #138 flags)- HRADBA, or some other DLL would need to scan it.
So- find the address of an instruction that will get you kicked when you change it, change it (e.g. nop out the bullet decrement code)- and then set a hardware READ breakpoint on this address.
Now go run around in a HB enabled server- and wait till you get kicked. Straight before- you'll get a hit a HW read breakpoint coming from a function in HRADBA.DLL.
Using IDA pro- find this function and reverse the first few parameters + the code near where the breakpoint was hit. NOTE: You MUST understand what the portable executable file format is and how it works to do this well.
An In-Depth Look into the Win32 Portable Executable File FormatAn In-Depth Look into the Win32 Portable Executable File Format, Part 2.
Now- you can use a portable executable viewer/modifying like Yoda's awesome
LordPE to fool HRADBA- using the knowledged you can from reversing the code scanning algorithm in HB.
I couple of important things- if you change code in HRADBA.DLL (which you will need to)- you'll then get kicked for #28 (HB is hacked). Use the same technique above to find out what code/DLL in tern scans HRADBA.DLL aswell- and do all the steps above for it too.
I have proof of concept (hacked GAME.DLL, LOGS.DLL, HRADBA.DLL files) I can send to you- but it would be great to see you have a go. You learn a lot more by trying things yourself and asking more questions; and the end result is more satisfying when you finally get there
.