idk its not have connection with main but maybe GG
Printable View
Hello again
Well since i developed a way to get of evade hacks on compatibility mode, i come back using this source, and now again im having problem with this soft " Hide Toolz "
The soft, is a driver to load any process in Hiden mode, so any aplicattion that is hiden with it can bypass the launcher...
I found somethings interesting:
* If u put the 32 bits string of this soft in your source it wont work, couse the soft load in a hiden mode also and it "changes" its strings somehow, and same way, it can always be launched first....then load hack in hide mode, close the loader soft and then open your game.
* If u put the main.exe in hiden with this aplication, the source will get the hacks that are "cloacked"... so its a hint :)
if u interest in some "developing" please comment ;)
here is the string of HIDE TOOLZ
Code:{0x41155C, {0x55, 0x8B, 0xEC, 0x83, 0xC4, 0xF0, 0xB8, 0x84, 0x14, 0x41, 0x00, 0xE8, 0xC8, 0x22, 0xFF, 0xFF, 0xB8, 0xBC, 0x15, 0x41, 0x00, 0xE8, 0x5E, 0x4B, 0xFF, 0xFF, 0x8B, 0x15, 0xDC, 0x23, 0x41, 0x00}}, // Hide Toolz 2.1
Mirror Link:
Working MuGuard Source - SeeItWorks .COM Download Center
...
you can post guide how to add more hacks to block ?
leo can u tell me what program i can add this sourses?
OK
I followed the video, but the DLL doesn't block the program...
Here is the 32 bytes
Did I do something wrong?PHP Code:{0x514467, {0x49, 0x75, 0xF7, 0xE9, 0x4F, 0xFF, 0xFF, 0xFF, 0x90, 0x8B, 0x02, 0x83, 0xC2, 0x04, 0x89, 0x07, 0x83, 0xC7, 0x04, 0x83, 0xE9, 0x04, 0x77, 0xF1, 0x01, 0xCF, 0xE9, 0x38, 0xFF, 0xFF, 0xFF, 0x5E}}, //Anti Alt-Tab
That is not true, you can make a driver to check DKOM, SSDT hooks, and many other editing and wont be consider rootkit. Also preventive methods of anti hook on ring 3 would make the rest of the job. Probably injecting library will be the only malware fuction on an a invasive anti cheat. The rest is perfectly non malware. :ott1:
Serpent / RSA / BlowFish / SHA / AES
Plenty of examples in google for C++ coders. those focus the attacker on find the public key only and are pretty good resisting bruteforce (specially AES and Serpent).
This is true, on a certain level. You can always protect your code with virtualization methods, permutations, metamorph, etc, etc. Plus preventive methods, CRC and a own made packer, you can make things difficult. At least for the MU community knowledge.
It depends if its for money it will worth the time spended, if its for public i guess not.
And kernel programming is allmost the same has ring3 (dont kill me kernel coders) but essentially its allmost the same. I think if you good coding on ring3, passing to kernel wont be a problem :thumbup1:
There is studys about method for protecting in whole server side, wich havent bring any success yet, client its essential part of what the cheater/atacker will try to mod. So mix protection (Client & Server) is a good way, more if they are both communicated all the time.
Cheers.
Any one explain to me why the antihack doesnt block the programs I added in the 32 bytes dump?
mọi người cho mình hỏi làm thế nào để lấy offset của IP , serial , version main 1.07h ???
(ai biet tieng anh dich giup em)
Help me. I need offset IP , serial , version main 1.07h
I want to be a programmer: D
How do these codes do I use the expression naısl Do you know il injected
I have managed to temporary resolve this by disabling ChangeSerial(). what exactly changeserial do? and also dll not working in 64bit os. Can anyone tell me how to work around the source code for this dll to work with 64bit? I search the net and stuck in WOW64, anyone here can help?