Twitter | Pretraživanje | |
Carl Schou / vm
BattlEye has for the past year been detecting unknown cheats using memory heuristics combined with a method known as stack walking:
Reply Retweet Označi sa "sviđa mi se" More
Carl Schou / vm 6. sij
Odgovor korisniku/ci @vm_call
BattlEye developers have not responded to my LinkedIn inquiries so i don't believe they are interested in fixing any of the flaws i mentioned :-(
Reply Retweet Označi sa "sviđa mi se"
Carl Schou / vm 6. sij
Odgovor korisniku/ci @vm_call
Next article in the BattlEye series will either be on the kernel mode shellcode, the single-stepper shellcode or the beclient2 shellcode (but i have to finish devirtualizing this first), so buckle up !
Reply Retweet Označi sa "sviđa mi se"
Douggem 7. sij
Odgovor korisniku/ci @vm_call
Classic. Back in the day he'd int3 game engine functions and check the ret address against a whitelist to make sure dirty hackers weren't calling them, but removed that feature when he added virtualization. Thanks a ton for your work!
Reply Retweet Označi sa "sviđa mi se"
Carl Schou / vm 7. sij
Odgovor korisniku/ci @dougconfere
That was arma specific, right? I remember hearing about that
Reply Retweet Označi sa "sviđa mi se"
wacked aka dubya 7. sij
Odgovor korisniku/ci @vm_call
Doesn't that mean that you can add an exception handler with higher priority (worst case: hook ntdll!KiUserExceptionDispatcher) and then parse out the parameters in your handler? So basically hooking it by catching exceptions?
Reply Retweet Označi sa "sviđa mi se"
NoMoreGames 7. sij
Odgovor korisniku/ci @vm_call @0xrepnz
I would use some antivirus to block BattlEye injections into the game process.
Reply Retweet Označi sa "sviđa mi se"
Mr Bond 🧢🇺🇸 7. sij
Odgovor korisniku/ci @vm_call @secfarmer
BattleEye’s incompetence made game hacking in Arma 2 so much fun, their was very little you could do with a little script.
Reply Retweet Označi sa "sviđa mi se"
Mr Bond 🧢🇺🇸 7. sij
Odgovor korisniku/ci @vm_call @secfarmer
*couldn’t
Reply Retweet Označi sa "sviđa mi se"