Hi everybody, I was searching for hacks/trainers/bypasses for S4 League for a long time, with no success; however, I find out some information that should be shared, or at least I think it: hope that this will be somehow useful to all you e*pvpers. Please note that I am not requesting anything in this thread but all your ideas, your experiences about the bypass.
First of all, many people at the question "is there a working bypass?" answer "use Syntax's one". To most of you the answer is clear, but to avoid mistakes and to keep up to date I state that today, 14.5.09, the bypass made from Syntax does not work. Seems obvious but in many forums there are differents opinions anyway.
Second, the only UCE known today is Kiki's UCE, which I attached to the thread if anyone wants to give it a try: note that this CE doesn't work on Vista, so I couldn't try it.
Third, the easiest way to bypass HS is usually removing the call function from the main exe that fires up EHSvc.dll. Modifying HS files is very hard, because they're packed with Themida; so by my point of view, noping the function it's not a so big deal. Anyway I haven't got big knowledge of reverse, so I will just ask without giving (useless?) advices.
Finally, just in these days the user xorheater says that he managed to bypass HShield. If it's not true, screw him. If it's true (as I think, he doesn't look like a noob), then I would be very pleasured if he could post not the entire method (it would be patched in days), but just some advices to find out which "parts" of S4Client are vulnerable.
That's all I had to say, note that I'm not English so my speech should suck, and that this is my first (but I hope not last) post. Please don't flame/OT, because I think the info might be useful at least for someone.
Thanks everyone.
First of all, many people at the question "is there a working bypass?" answer "use Syntax's one". To most of you the answer is clear, but to avoid mistakes and to keep up to date I state that today, 14.5.09, the bypass made from Syntax does not work. Seems obvious but in many forums there are differents opinions anyway.
Second, the only UCE known today is Kiki's UCE, which I attached to the thread if anyone wants to give it a try: note that this CE doesn't work on Vista, so I couldn't try it.
Third, the easiest way to bypass HS is usually removing the call function from the main exe that fires up EHSvc.dll. Modifying HS files is very hard, because they're packed with Themida; so by my point of view, noping the function it's not a so big deal. Anyway I haven't got big knowledge of reverse, so I will just ask without giving (useless?) advices.
Finally, just in these days the user xorheater says that he managed to bypass HShield. If it's not true, screw him. If it's true (as I think, he doesn't look like a noob), then I would be very pleasured if he could post not the entire method (it would be patched in days), but just some advices to find out which "parts" of S4Client are vulnerable.
That's all I had to say, note that I'm not English so my speech should suck, and that this is my first (but I hope not last) post. Please don't flame/OT, because I think the info might be useful at least for someone.
Thanks everyone.