![]() The server then stores these hash sets so that if your cheat is ever made public you'll be banned retroactively. A properly implemented client side anti cheat will enumerate all mapped memory regions and send a hash set of various offsets of all mapped memory segments to a server. The problem is that once the fact that you're injecting into the process becomes known, your code will be reachable by the module you're trying to attack. Even if your hack is never made public it's advisable to make sure your DLL never shows up in a crash report or something similar. Study that if you want to understand a very common hiding technique. What this does is that it emulates the behavior of LoadLibrary without putting the DLL into the process module list. ![]() ![]() In general if you want to inject a DLL which is harder to detect and won't show up on the module list of the process you use something called manual mapping. What you're trying to do is very hard if the attacker is an experienced game hacker and the specifics of the cheat is unknown.
0 Comments
Leave a Reply. |