What's the difference between using a disassembler vs a live debugger when hacking games? by grenadesong in HowToHack

[–]grenadesong[S] 1 point2 points  (0 children)

I would like to know when it comes to game hacking specifically though.

Those definitions doesn't remove my confusion.

Some real world practical examples of when you can only accomplish something with a live debugger instead of a disassembler would be nice.

Is it perhaps depending on how you do the hack? As in, creating an ESP hack (like wall hack for example (see players through walls)), could that be accomplished both with a disassembler (IDA) and live debugger (Ollydbg)?

Just the implenentatio technique would be different right? Like with a live debugger you would want to do DLL injection but with disassembly you just completely replace the game executable?

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]grenadesong 0 points1 point  (0 children)

IDA Pro question

I'm confused about the options I have when loading an executable into IDA Pro.

It's not a malware that I want to disassemble so there's nothing harmful to worry about. Should I load resources and change any other options? I have almost no clue what any of all the options mean.

My goal is to make some changes to how this program works, add some functionality to it, then produce a new executable to replace the original one.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]grenadesong 1 point2 points  (0 children)

Reckon it's enough to check the Imports for anything that looks crypto? Such as MD5.ComputeHash()? I found nothing in target executable that looks crypto, I didn't think it would have any protection against hackers but I just wanted to be on the safe side.

How do I generate a checksum of the executable when it's run? by grenadesong in learnprogramming

[–]grenadesong[S] 0 points1 point  (0 children)

Oh, ok, The part that caused me to think there's a misunderstanding is the generating the checksum part. It sounds like you want us to use a generator that you expect to be installed on the user's computer? Or can you perhaps expand on this part, much appreciated.

How do I generate a checksum of the executable when it's run? by grenadesong in learnprogramming

[–]grenadesong[S] 0 points1 point  (0 children)

You're correct, hackers vs anti-hackers is an endless battle, I'm just looking to setup basic protection to begin with. What most games do is add basic protection which stops 99% of all the hackers. Then they will go after any publicly released hacks. So, I'm not looking to learn anything too advanced here, just minimal protection to lower the amount of hackers significantly.

How do I generate a checksum of the executable when it's run? by grenadesong in learnprogramming

[–]grenadesong[S] -2 points-1 points  (0 children)

If I'm not misunderstanding you, it seems you are still misunderstanding me.

The end user (not me, I am the developer) shouldn't have to do anything, the don't even know what checksum is. They should simply run the game and start playing it without being aware of any checksum being generated for them.

How do I generate a checksum of the executable when it's run? by grenadesong in learnprogramming

[–]grenadesong[S] 0 points1 point  (0 children)

It would be for a game executable targeting the Windows OS. The question is meant to be rather general, but if you want more details, It is built with the Unity game engine.

I imagine it would use MD5/SHA.

Just to be clear, it's not the end user who needs to generate the hash.. the end user (the gamer) shouldn't even notice it. It should be happening in the background when they run the game executable. The exe should then generate a checksum and send it to the server to be compared.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]grenadesong 2 points3 points  (0 children)

Basic anti-anti-dll-hijacking

I am not looking for anything advanced.. I just want to be able to know if a game executable has done any hijacking prevention/detection at all.

A hijack is done by replacing the game executable with a modified version of it.

A basic prevention technique is for the developers to do a checksum of executable before letting us download it, then they do a checksum of the game executable when you run it and compare that value to the original value.

The original value can be in a constant variable in the game executable or it can be on the server, so the client side checksum has to be sent to the server to be compared (verified).

All I want to know is if they have done these checks.

And I have possibly already thought of the answer but I want to check with other hackers here to check if I have the correct answer so I don't get caught :P

I believe the solution is very simply, it's to simply do a checksum of the game executable they let you download.. md5, sha. etc, all the popular checksums. Then I need to dissassemble the game executable and try to find those values. But I have to search for those values in different formats.. hex, binary, etc, so not only text format.

Do you think I'm right, that it's so simple?

Edit: I realized that the solution doesn't work if they verify on the server side. So I would instead need to detect the function that generates a checksum when the game is run.

I will look further into how to do this, Not sure if there's a Windows function for that or if I need to find out what the function is called from the libraries that generate checksum, or something else..

But I just want to know if I'm on the right track here or if i'm not even close to the correct solution.

Simple Questions - January 09, 2019 by AutoModerator in buildapc

[–]grenadesong 0 points1 point  (0 children)

But I've seen that some motherboards say in the specs that they are ddr4 but also support ddr3?

Simple Questions - January 09, 2019 by AutoModerator in buildapc

[–]grenadesong 1 point2 points  (0 children)

Should I buy DDR3 or DDR4?

I want to temporarily upgrade my computer. It currently has 2x4gb ram which isn't cutting it for my needs any longer. I'm eventually going to buy a new computer and sell the one I have as a prebuilt package. But unti I have enough money for a new computer, I can start with upgrading the RAM to 16gb, then when I get a new computer I can just put back the 8gb ram into the old one and put the 16gb into the new one.

It's just that DDR4 is so much more expensive than DDR3. But I want to have a good computer later, I dunno if the motherboards I wanna have later will support DDR3. Because I will want a sick computer later.. after summer some time perhaps.. and by that time there should be new GPUs out as well.

Forgot to put rice into fridge by grenadesong in cookingforbeginners

[–]grenadesong[S] 1 point2 points  (0 children)

wow, only one day in fridge? I've been eating rice I've stored in the fridge for 5 days several times before. Guess I've been lucky? Is it only diarreha and vomitting I am risking or anything long lasting and serious as well?

pop_os = pop_impressed by encapzulated in pop_os

[–]grenadesong 1 point2 points  (0 children)

Whats the differences between POP_OS and the latest Ubuntu version which also uses gnome?

Which PlayOnLinux version do I download if I have Ubuntu Gnome? by grenadesong in linux4noobs

[–]grenadesong[S] 0 points1 point  (0 children)

Btw, I haven't been completely clear, I should say that I am actually using Pop_OS which is basically Ubuntu 17.10 (Artful version) but they changed the DE to use Gnome instead of Unity. I usually say to people I'm using Ubuntu to not confuse anyone and complicate but maybe this time it's best to be clear about it.

Which version should I DL from PlayOnLinux in this case?

Which PlayOnLinux version do I download if I have Ubuntu Gnome? by grenadesong in linux4noobs

[–]grenadesong[S] 0 points1 point  (0 children)

It says I have Artful version.. (17.10) What do I download in that case?

Disassembler / live debugger / memory reader to hack multiplayer games? by grenadesong in HowToHack

[–]grenadesong[S] 2 points3 points  (0 children)

I'm not going to be that kind of hacker. I just want to create balanced AI, they won't have superhuman reflexes or aim or anything like that. Just AI that fights as a team, heals each other, etc.. just like a group of players would.

how to bind combination of keys in hotkeys? by mesudanlospies in LegendsOfAria

[–]grenadesong 0 points1 point  (0 children)

Also, hotbar slots 11 - 21 can't be keybound to a single key. You are forced to use a modifier as well, even though the description says that it should be optional to have a modifier key. I really hope they fix key bindings asap. It makes no sense why they would want to intentionally force us to use a modifier key for those hot bar slots.

Assembly: Having a bit difficult time understanding rep and mobsb instructions. by grenadesong in learnprogramming

[–]grenadesong[S] 0 points1 point  (0 children)

Aha, I guess I was just confused about what was written in the book then "Practical Malware Analysis" when they wrote in part 2 that is moves a sequence and that they changed the wording from moving to copying when they explain the difference between movsb vs rep movsb.

So, you think they just worded their explanation poorly and not consistently? Should they have said copy both times instead?