Quote:
Originally Posted by syntex
just a hint:
check the recv 0x03 packet (its hackshield check).
Unloading drivers isnt the simplest thing in the world :P rather try to find the functions that check for manipulated functions cause its much easier and waste less time ;)
btw I unhook and hook on 0x03 is a good start but will end in loosing some packet informations.
Keep reversing and try to understand whats going wrong with your hack , you can simply start a new project and figure out what hook or mem edit will expell ya .. for example if you only use recv detour/hook you wont get expelled , when you add send now you will , that means send hook/detour is checked by hackshield..
syntex : - )
|
0x03 is "m" packet as far I remember. Yea I know it's a hackshield's check. I could try use hook/unhook on 0x03, but now I would like to finish my previous project. As you see I'm trying to learn as much as I can, so I can't just give up the way I chosen.
I found callback function again btw :).
Everything was kinda good before update. But how I'm supposed to reverse now? When EagleNT is loaded -> I can't attach usermode debugger to kernelmode process. And unloading EagleNT forcefully will endup in BSOD. Bypassing EagleNT loading (as I did before) -> all hackshield functions will stop operate so I can't connect or trace mem-manipulation detecting functions (but the hackshield won't close the game aswell :D).
Today I had one goal -> Let's figure out those session Keys. I did it.... Was kinda suprised how easy it was. Now I can simply "run and play" :D
Now I don't know: Shall I release it or not? I think I know what would Inix do after the release, but maybe I would be able to reverse it again...
Quote:
|
good luck and keep the community on running there are may some people that can help you with your problems and bring you forward.
|
Well, maybe you :)