Quote:
Originally Posted by cookie69
If you do it perfectly, you must be able to bypass the gg with CE and you can even modify Game memory (I did a mistake when I said that you can't modify the memory..)
I personally had to re-patch the kernel to be able to use CE again but it is working and it is undetected with Windows 7 x64 bits 
|
Hello, nice work here!
So, I was trying to bypass the hackshield on a certain Flyff pserver via reverse engineering its MiniA.exe via x32dbg software. The results got me stuck so below are the steps i did including the results of each.
1st. I did the sunkist method so i can launch the MiniA.exe via shortcut so it looks like i launch it on launcher.
2nd. I attached the MiniA.exe to x32dbg app to reverse the address where 'EHSvc.dll' is located. Did changes i have found on the internet. (changing the memory address of 'EHSvc.dll' to 2 bytes (00 00))
3rd. So, after the modifications, i have patched the MiniA.exe to the game folder but with different name so the original MiniA.exe would be backed up.
4th. Changed the names on the game folder so I would run the MiniA.exe(patched) via MiniA.exe - shortcut.
5th(result1). Right after launching the MiniA.exe - shortcut even in administrator, the process exits immediately. So, attached MiniA.exe(patched) again on debbuger to modify the kernel32.ExitProcess. Locates its address and assembled it to 'ret' so it wont exit.
6th(result2). After doing the first workaround and patched it, i ended up with an .exe that could not be read by the game so i guess that was not the right move, i even did the same modification on kernel32.TerminateProcess but ended up with the same result.
Now i am kinda stuck with this and been searching for workarounds tho. Any clarifications on my steps that made me wrong is highly appreciated!
Thanks guys