Cheat Engine Forum Index Cheat Engine
The Official Site of Cheat Engine
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 


.

 
Post new topic   Reply to topic    Cheat Engine Forum Index -> Cheat Engine
View previous topic :: View next topic  
Author Message
catfood
Cheater
Reputation: 0

Joined: 22 Jun 2015
Posts: 34

PostPosted: Fri Mar 25, 2016 2:18 pm    Post subject: . Reply with quote

.




.


Last edited by catfood on Mon Mar 28, 2016 8:21 am; edited 2 times in total
Back to top
View user's profile Send private message
++METHOS
I post too much
Reputation: 92

Joined: 29 Oct 2010
Posts: 4197

PostPosted: Fri Mar 25, 2016 2:36 pm    Post subject: Reply with quote

Search using hex values. In the memory viewer, there should be a 'bytes' column. You can highlight several instructions (for a unique array) and right-click, select Copy to clipboard --> Bytes only (no address).

Alternatively, just highlight the instruction that you want to search for, and let CE build a script using AOB injection under the tools/auto assemble window.

Searching assembly code should work, but I'm not sure how it handles module addressing. Perhaps turn that off before you search. You can turn off module addresses in the memory viewer...select View from the drop-down menu, and uncheck Show module addresses.
Back to top
View user's profile Send private message
catfood
Cheater
Reputation: 0

Joined: 22 Jun 2015
Posts: 34

PostPosted: Fri Mar 25, 2016 7:55 pm    Post subject: Reply with quote

. .

Last edited by catfood on Mon Mar 28, 2016 8:21 am; edited 1 time in total
Back to top
View user's profile Send private message
ParkourPenguin
I post too much
Reputation: 152

Joined: 06 Jul 2014
Posts: 4702

PostPosted: Fri Mar 25, 2016 8:25 pm    Post subject: Reply with quote

If you're just looking for intra-module jumps to a specific address, then go to Memory Viewer -> Tools -> Dissect Code. Select the module(s), and after it's done, you can go to that address and see everything that jumps to it.

If you're looking for any instruction that could jump to any address inside that module, then that's much more complicated. You'll need to understand how jumps are encoded and how to use Lua in CE. Search for the opcodes in executable memory only using an AoB scan, and use the bytes after any found opcodes to determine whether or not it's jumping inside the module. Even then, there's no guarantee the jump or the destination is aligned in such a way that it's likely to be executed. You might a fake jump lying within another instruction (or two).

_________________
I don't know where I'm going, but I'll figure it out when I get there.
Back to top
View user's profile Send private message
++METHOS
I post too much
Reputation: 92

Joined: 29 Oct 2010
Posts: 4197

PostPosted: Sat Mar 26, 2016 6:57 am    Post subject: Reply with quote

catfood wrote:
lets say theres 4 or 5 other places where that .dll hooks. im not sure where those are, my goal is to find those other locations.
-Knowing this in the first place would have been helpful. I would personally use ollydbg or x64dbg for something like this. However, in CE, you can try: Memory Viewer/View/Enumerate Dll's and Symbols.
Back to top
View user's profile Send private message
catfood
Cheater
Reputation: 0

Joined: 22 Jun 2015
Posts: 34

PostPosted: Sat Mar 26, 2016 7:06 am    Post subject: Reply with quote

. .

Last edited by catfood on Mon Mar 28, 2016 8:22 am; edited 1 time in total
Back to top
View user's profile Send private message
++METHOS
I post too much
Reputation: 92

Joined: 29 Oct 2010
Posts: 4197

PostPosted: Sat Mar 26, 2016 7:19 am    Post subject: Reply with quote

Did you try as I suggested to see if the module that you are looking for even shows up?
Back to top
View user's profile Send private message
catfood
Cheater
Reputation: 0

Joined: 22 Jun 2015
Posts: 34

PostPosted: Sat Mar 26, 2016 7:55 am    Post subject: Reply with quote

yeah, that leads me to where they start in memory. but doesnt help me find the location they actually hook at, to create the memory in the first place.

(my end goal here is to modify the hook point so that the hack.dll can not properly hook to my game)
Back to top
View user's profile Send private message
ParkourPenguin
I post too much
Reputation: 152

Joined: 06 Jul 2014
Posts: 4702

PostPosted: Sat Mar 26, 2016 8:28 am    Post subject: Reply with quote

If you only protect that one single point, then the only thing that'll do is invalidate the .dlls for that version. You don't have to make a hook at a specific point, so doing this isn't really going to stop anyone. Protect the entire thing, however, and you may get some results depending on how good your protection is.

Regardless, have you tried setting breakpoints inside that .dll?

_________________
I don't know where I'm going, but I'll figure it out when I get there.
Back to top
View user's profile Send private message
++METHOS
I post too much
Reputation: 92

Joined: 29 Oct 2010
Posts: 4197

PostPosted: Sat Mar 26, 2016 9:13 am    Post subject: Reply with quote

catfood wrote:
yeah, that leads me to where they start in memory. but doesnt help me find the location they actually hook at, to create the memory in the first place.
-You set breakpoints. From there, you can navigate back or look at the stack.

By the way, are you doing this to circumvent existing anti-cheat, or something else?

We can help you better if you provide more information.
Back to top
View user's profile Send private message
catfood
Cheater
Reputation: 0

Joined: 22 Jun 2015
Posts: 34

PostPosted: Sat Mar 26, 2016 10:19 am    Post subject: Reply with quote

. . .

Last edited by catfood on Mon Mar 28, 2016 8:22 am; edited 1 time in total
Back to top
View user's profile Send private message
++METHOS
I post too much
Reputation: 92

Joined: 29 Oct 2010
Posts: 4197

PostPosted: Sat Mar 26, 2016 10:44 am    Post subject: Reply with quote

Okay...I see what you're trying to do now. In that case, as ParkourPenguin suggested, this method of protection is not ideal at all.

Also, depending on how the cheats were written, they could call a function inside their dll, in lieu of jumping to it. In that case, you'll have to analyze the stack to see where the calls are coming from. With ollydbg or x64dbg, you can view all intermodular calls, making it easy to see all of the calls to that particular dll module.

But...what's to stop them from simply renaming their module or changing the location of their hook? Or are they using one of the game's dlls?

I can't help much in the way of protection, so someone else will have to chime in. I know that there are many ways to do it...such as packing the file, obfuscating code, running memory integrity checks etc., but if they're good enough, nothing you can do will stop them unless everything is server-sided with additional protective measures in place.

By the way, why do you care if people cheat? Are you implementing micro-transactions/DLC or something? Does your game have online components that would even warrant any anti-cheat measures?
Back to top
View user's profile Send private message
++METHOS
I post too much
Reputation: 92

Joined: 29 Oct 2010
Posts: 4197

PostPosted: Mon Mar 28, 2016 8:38 am    Post subject: Reply with quote

I guess the OP didn't want his 'advanced' anti-cheat measures publicly disclosed. Very Happy
Back to top
View user's profile Send private message
Zanzer
I post too much
Reputation: 126

Joined: 09 Jun 2013
Posts: 3278

PostPosted: Mon Mar 28, 2016 11:21 am    Post subject: Reply with quote

woops
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    Cheat Engine Forum Index -> Cheat Engine All times are GMT - 6 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group

CE Wiki   IRC (#CEF)   Twitter
Third party websites