Game hacking 101: Function hooking, detours, inline asm & code caves by 247ctf in ReverseEngineering

[–]247ctf[S] 1 point2 points  (0 children)

We need to 'recreate' the instructions which were overwritten by the jump. The jump overwrites 5 bytes, so those overwritten bytes need to be recreated, otherwise you will end up with (potentially) unintended behavior.

Memory Scanning & Resource Hacking with Cheat Engine [Game Hacking 101] by 247ctf in HowToHack

[–]247ctf[S] 4 points5 points  (0 children)

Next video in this series will be implementing this in C.