Cheat Engine Forum Index Cheat Engine
The Official Site of Cheat Engine
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 


server sided...

 
Post new topic   Reply to topic    Cheat Engine Forum Index -> General Gamehacking
View previous topic :: View next topic  
Author Message
aldreacuatro
How do I cheat?
Reputation: -1

Joined: 09 Sep 2010
Posts: 4

PostPosted: Thu Sep 09, 2010 1:51 pm    Post subject: server sided... This post has 1 review(s) Reply with quote

good evening guys i just wondering if the server sided there has other way to hack it using CE...?and consider it to make it real ex. you have a 100k when you change the money it will change but when you try to buy it, it will not consider it as 100m ex. Shocked
Back to top
View user's profile Send private message
Dark Byte
Site Admin
Reputation: 471

Joined: 09 May 2003
Posts: 25835
Location: The netherlands

PostPosted: Thu Sep 09, 2010 2:56 pm    Post subject: Reply with quote

http://wiki.cheatengine.org/index.php?title=Editing_Server_Sided_Values

note that #6 falls in the same legal category as #3 and #4

_________________
Do not ask me about online cheats. I don't know any and wont help finding them.

Like my help? Join me on Patreon so i can keep helping
Back to top
View user's profile Send private message MSN Messenger
aldreacuatro
How do I cheat?
Reputation: -1

Joined: 09 Sep 2010
Posts: 4

PostPosted: Fri Sep 10, 2010 12:20 am    Post subject: Reply with quote

thanks by the way.. hope i will find one lol.. Very Happy
Back to top
View user's profile Send private message
jonander50
Cheater
Reputation: 3

Joined: 31 Oct 2007
Posts: 40

PostPosted: Sat Sep 11, 2010 9:08 am    Post subject: This post has 1 review(s) Reply with quote

These solutions are funny but not very practical. To modify server data must first access the data traffic, ie how and where to apply these data. To do this you need before you ever reach your computer, and generally not going to be able to get physical access, since most of their games spread across multiple computers and servers in various locations, so you would have to access non-physical, ie virtual. There are plenty of programs to get virtual access to a computer from another, also called remote administration tools, completely legal and commercially distributed. But for these cases need an adaptation of these software that allows us to get such access without consent, because obviously the manager or managers of the game will not allow us to edit some data that could mean some loss of income and money (since there are assholes paying for virtual items) due to the free upgrade of the character. Clarify that not paying for bits of memory is illegal, but I do not think you will want to participate in this collective asshole ever, we will preset values, concepts of good and evil (which really are as relative as the subjectivity that one would put). First, we need two things: Work from a cyber-cafe (to avoid legal traces [Forget about the proxy, the investigation could last for years and eventually get the address of the loop so it will work from a cyber and if possible some few kilometers from our city, but would remain an indication that we were very suspicious and had carried out from a two-lane cyber below our house]) and the modified software, and for this case and easy to use, very reconciled, we shall use a spring called Trojan. A Trojan is basically the remote management application used by some technicians to fix computers remotely, but modified to not have to install the user previously and loaded with extras. Obviously this category falls within the "malware" and therefore will need to change some parameters before the program (such as digital signatures and some offsets) for the antivirus receiver does not expose anything suspicious. This process is called crypting, and the applications used to do Crypters. Once we have the Trojan itself (there are many versions, but I recommend one called Poison Ivy, or perhaps Spynet, specifically for its stability and practical part) and "Crypter" server encrypt the Trojan. (All these processes are broken down into sub-processes, but everything is perfectly explained in Google, you only have to search for each concept name in this synthesis show). There are also the "Joiners," which mixes two or more files into an executable, so that we can create a more probable if, when run, it really shows any type of content (I personally recommend the Cactus joiner in its final version) taking a better "social engineering." The social engineering encompasses all methods used to entice the recipient to finally open the file or in general to do something which at first denied, such as hotmal get a password by calling the operator and posing as the boss). Therefore we can not send the modified software, encryption and coupled with the joiner simply because if we will need a feasible and reasonable excuse to do that the developer finally run the file. For this there are many ways, such as customer service, email for requests for work as a programmer (we can say it is a new application that improves renders X, or simply a purification) or doing maps (and send a "pre-designed map" .) Generally, computers are responsible for receiving files are independent of the host CPUs, but first we do not know with certainty, and secondly there may be relevant data in the computer later requests to use another method of social engineering. What we really need is the relationship between the server hosting and computer key. In most games when there is some specific problem developers need access to the folder of characters and not made directly from the host if this were a standalone server but accessed from any type of application to these tabs. Something like a direct access to account records. This access is more complicated and needs a strategy. I invented a procedure for this type of situation years ago and is called the scale of powers. " We must first get in touch with a friend of a friend of a friend ... the owner and gain access to your computer. Then, making us go through that distant friend, following up the hierarchy and talk to the closest friend to the owner immediately making us go through the above and gain access, and so on until you get mail from the owner's wife or something. The only drawback is the amount of processes involved in the final process, but this will always be successful sooner or later, because in fact, do not forget that we are treating with humans and not machines, and humans are weak mentally (Thanks psychopathy) . Once the "hierarchy" and get full access to the server, we can even make money by selling specific objects or levels by X money while working from the cyber. We can say that this requires an account, preferably in western union (has little proof, and therefore we give little information) is completely independent from us. When we finish getting the money (which in extreme cases can lead to millions, because remember, there are assholes who pay good money for pixels) we cause a progressive decrease and intentional quality of the game until they decide to cease business. After that we will wait two or three months and we can withdraw the money quietly and without evidence of the process.
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    Cheat Engine Forum Index -> General Gamehacking All times are GMT - 6 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group

CE Wiki   IRC (#CEF)   Twitter
Third party websites