Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Silkroad Online > SRO Guides & Templates
You last visited: Today at 17:20

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Guide] Tips for trying to avoid simple HackShield detection

Discussion on [Guide] Tips for trying to avoid simple HackShield detection within the SRO Guides & Templates forum part of the Silkroad Online category.

Reply
 
Old   #1

 
elite*gold: 260
Join Date: Aug 2008
Posts: 560
Received Thanks: 3,778
[Guide] Tips for trying to avoid simple HackShield detection

About:

As of recently, Hackshield has been detecting a lot of tools. While there are many ways for this to be done, Hackshield currently uses very simple methods for Silkroad. This could change at any time, but for now they seem to be using a really simple protection mode. In this guide, I will go over two approaches that can help, but are not permanent solutions to avoiding Hackshield detection in the most commonly used and detected tools.

:

Quote:
Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.
Download: (< 1mb)

We will be using ResHack to change the titles of any GUI related stuff without having to recompile the tool. While being able to recompile a tool can offer more protection through code change, not all tools have source code available. Here is a step by step pictorial guide of modifying an existing tool to help avoid detection:

1. Download and Extract Reshack


2. Run "ResHacker.exe"


3. Select File->Open and choose the tool. In this case, I will use my edxSilkroadLoader5.


4. Expand the "Dialog" section until you get to the "1033" resource and select it. Some tools might have many dialogs, so you will want to perform the following steps for all of them.



5. As seen in the first screenshot above, there will be a CAPTION field that contains the window's title. Simple change the text between the quotes. As you do so, the Compile Script button becomes enabled since you made changes. In this case, I will make it have a blank title.


6. Now hit "Compile Script" to apply your changes. You will notice the dialog title changes in the second window as seen in the second screenshot from Step 4.


7. Now click File->Save. The changes are written to the exe file. If you check the source folder, you will see ResHack makes a convenient backup copy for you!


At this point, we will now be able to defeat any simple window caption checks Hackshield might perform. Likewise, you can change other GUI elements as needed to get around any other checking that might be done. For really simple tools, this is all that is needed to get around Hackshield closing applications at startup.

However, there is more detection that goes on than just this! After approximately 10 minutes, HackShield performs some more complex checking of running processes that will trigger a client disconnect upon detection. Using ResHack is not enough to get around this. That brings us to our next program...

:

Quote:
Safengine provides a powerful virtual machine to protect your applications against reverse engineering or unwanted modifications. The protector will convert your sensitive code (in x86 assembly) into a random instruction set which can only be executed by the virtual machine interpreter embedded into your application after protection. These virtual machines are very unique, fully randomized and heavily obfuscated.
Download: (21mb)

We will be using Safengine to protect our tools from any unwanted analysis by Hackshield. NOTE: I only choose to use Safengine because it offers enough features in their demo mode that make it practical to write a guide about. You can use a wide variety of other protectors as well. Safengine Demo locks the protected exe to the computer that generated it, so you cannot share protected EXEs.

1. Download and Extract Safengine.


2. Run "Safengine.exe". It may take a minute or so to load.


3. Click on "Browse..." and select the tool you wish to protect. For this example, I will continue to use my edxSilkroadLoader5. Make sure to select the EXE that was modified earlier using ResHack!


4. Now, we will set some simple options to help protect the exe. The key features to have if you are using another protector is Resource Protection, API obfuscation, and any dynamic/metamorphic code generation.

Expand the "Protection Options" field. Add checks to the following options:
* Protection Options -> Import Protection -> Fill Original IAT Trunk
* Protection Options -> Import Protection -> Hash API Names
* Protection Options -> Resource Protection -> Anti Dump
* Protection Options -> Metamorphic Code Generation



5. Click "Protect" and wait for the operation to complete. Click "Exit" and "No" to close the program.


6. You will see a new EXE in the source folder with a suffix of "_se". This is the newly protected file. Copy this file to a new folder and rename it to the original name.


7. Perform these steps for all EXE/DLL files required. Since I am using edxSilkroadLoader5.exe, I will also need to protect edxSilkroadDll5.dll.

8. Run the tools to make sure they still work! Some protectors cause certain programs to crash with some options, so it's a little trial and error here to find a nice configuration set to help protect the tools.

IMPORTANT NOTE: At the time of writing this guide, Windows Update seems to have broken their Hardware ID generation, so the EXEs generated don't seem to work. I'm sure they will get this taken care of soon. Having used this protector for a few days already on KSRO/ISRO without getting detected with HackShield, it is still worth writing about because it's such a nice protector. (Fixed 16/8/2010)

Themida also works really well it seems, but their trial mode only lasts 20 minutes, so it'd not work out well for most things. I'll be looking for more alternatives in the mean time as well, but since I was having so much success with Safengine, it is unfortunate the demo mode seems broken now.

Other Points of Interest

* Don't forget to change EXE/DLL names! This is really simple detection that most people know of, but it still can be efficient for people who don't take the time to do so.

* Commonly used data files by the program could be theoretically detected. For example, if HackShield were to check the user data folder for the edxSilkroadLoader5.ini, it'd be able to detect the tool when it was opened if it set a global hook on enough API functions. While I don't think any protection uses this scheme, it's something else that you can change to help avoid it.

* Commonly used ports, mutexs, pipes, or any other unique identifying handles can give away a tool as well. While the detection of a tool solely based on these methods is rather sketchy, there is nothing stopping them from simply not letting the client run if a certain port was open and in use. I've actually had HackShield connect to my proxy before this way!

* Any exe changes put you at detection risk. While it seems HackShield does not do anything with clients that have memory modified, they could easily detect this and D/C users over time. When this method is done, there is not much that can be done using these approaches and a bypass is required for sure.

Conclusion:

These methods are not 100% ways to avoid getting caught using tools. However, you can use them to help try for the time being. The less public a tool is that is protected, the lesser chance there is of HackShield getting the information from Joymax to block it. I just wanted to throw out some ideas and suggestions for people to try because this is "all you can do" without having a HackShield bypass to get around detection. Good luck!
pushedx is offline  
Thanks
18 Users
Old 08/16/2010, 22:47   #2

 
elite*gold: 260
Join Date: Aug 2008
Posts: 560
Received Thanks: 3,778
I just wanted to post an update that I contacted Safengine about that bug I mentioned about failed HWID and they got it fixed pretty fast. You should be able to use this guide normally now!
pushedx is offline  
Thanks
3 Users
Old 01/01/2011, 13:53   #3
 
elite*gold: 0
Join Date: Sep 2009
Posts: 36
Received Thanks: 0
I made everything following this guide and when im trying to use the protected loader, silkroad guard appears ,loads and after it dissapears im getting 'Please execute the "Silkroad.exe" ' error every time.What im doing wrong ? Don't know if it have anything to do with it but Safengine is different version than on your screens ,it's v2.0.1.0 and the exe file is called Shielden.I downloaded it from your link.

Edit: I unchecked Anti Inline API hook and protected loader stopped giving "please execute silkroad.exe" error but now it can only open 1 client.If i have 1 client running and will try to use protected loader it will give korean error that after translation means "silkroad is already running".Same thing happens if i during protecting check only those 4 options that you mentioned and uncheck those options that was there by default.What im doing wrong ?
peppe27 is offline  
Old 02/04/2011, 13:02   #4
 
KingOfBreaks's Avatar
 
elite*gold: 17
Join Date: Feb 2011
Posts: 577
Received Thanks: 101
ty
KingOfBreaks is offline  
Old 05/17/2011, 21:43   #5
 
elite*gold: 0
Join Date: Apr 2011
Posts: 10
Received Thanks: 1
Is it still working with the latest Hackshield update?
alltimelow92 is offline  
Old 01/26/2013, 18:24   #6
 
elite*gold: 0
Join Date: Aug 2008
Posts: 12
Received Thanks: 2
What if im using Jitbit Macro Recorder
djamog is offline  
Old 01/27/2013, 17:03   #7
 
elite*gold: 0
Join Date: Jan 2013
Posts: 5
Received Thanks: 0
hank you very much! =3
synysevend900 is offline  
Old 03/09/2015, 03:10   #8
 
elite*gold: 0
Join Date: Mar 2015
Posts: 1
Received Thanks: 1
im using macro recorder in digimon masters online , macro recorder is usually running with windows XP, but when i use it, it stays for about 10 secs and after wards it has an error message saying auto macro detected.. then automatically log off.

can some one help me with this issue?
imac0olcat is offline  
Thanks
1 User
Reply


Similar Threads Similar Threads
Tips to avoid BAN if ur using cheats/hacks
05/07/2010 - Grand Chase Philippines - 5 Replies
*some contents has been removed This is my tips: For 1 Hit Hack, The uses of 1 Hit Hack is for the following: Level Mission/s Job Change Acquiring Character
how to avoid detection when u use stage hack?
07/10/2009 - Grand Chase Philippines - 6 Replies
ahmmm pano ba maiwasan ung detection program ng gc kasi pag gumamit aq ng stage hack aun pagkatpos ng stage may lalabas na warning
Tips for avoid accounts being hacked
06/03/2009 - SRO Guides & Templates - 5 Replies
NOT FOR SRO ONLY :pimp: 1- Use an UPDATED Anti-Virus/Spyware/Adware. This is essential. avg or Kaspersky is enough for that I think. btw. Use Iceword at the same time is better. 2- Don't use the same ID/Password of your game (SRO. in this case) on Forums. 3- Do NOT use illegal 3rd party programs (Cracked programs). Since most of 'em are viruses. DO NOT use bot. I know its well for some lazy bones. BUT Its danger. 4- Be careful with the files you open (recent downloads). Also I'd...
Avoid scanner detection (question)
11/27/2008 - RF Online - 1 Replies
Hey, just wondering but is there any possible way to hide away from enemy scanners/ mini map? If so, any idea where to start looking? This would be ideal for pvp or Exping semi safe. cheers :]



All times are GMT +1. The time now is 17:21.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.