Quote:
Originally Posted by •A.Я.E.Z•™
es gibt injection wege die das ding nicht erkennt ^^ das teil ist hier auf epvp nur nicht wirklich lange bekannt.
würde mich wundern wenn das überhaupt jemand kauft zu mal könnte das jeder serverbetreiber selber basteln , ist aber nur zu faul. zb wiza
|
There is only one common injection method my engine doesn't detect, and that's manual injection. Here is a list of what doesn't work.
- RemoteLoadLibrary
- Detour Injection
- Thread Hijacking
- LdrLoadDll
- SetWindowsHookEx
Keep in mind it's not the injection that you have to worry about. It's the actual checks the engine makes is what makes it hard to bypass. You will need to break the AES packet encryption in order to even begin to bypass it (more than twice as strong than the LastChaos packet encryption). So I have high faith in my engine holding up to extensive testing. Tho with all of this security checks in place, there
will be a way to bypass it. Tho the methods will be extremely complex and take days to weeks to write up a logical bypass for. In that time frame I could release a maintenance patch within 24 hours to patch that particular method. So it will be a never ending battle between me and hack programmers until I get every single method patched (or until they give up because it becomes too much work for them). I don't care if there is a new bypass every day. I will roll out updates to patch every single method within 24 hours of the bypass release. Tho I will tell you this much, breaking the unique heartbeat will be your first priority. Because of how I wrote the engine, if you cant replicate the heartbeat then you'll never bypass the engine.