|
You last visited: Today at 22:12
Advertisement
hwid ban
Discussion on hwid ban within the Valorant forum part of the Popular Games category.
11/05/2021, 07:06
|
#16
|
elite*gold: 69
Join Date: Mar 2021
Posts: 1,097
Received Thanks: 248
|
my spoofer still works lol
|
|
|
11/05/2021, 16:34
|
#17
|
elite*gold: 111
Join Date: Jan 2021
Posts: 649
Received Thanks: 567
|
Quote:
Originally Posted by LukeManolia
my spoofer still works lol
|
FPT was known for a while, your **** is public lol. You work only on Intel cause that's what FPT only works on
50$ and 120$? Bruh you went super greedy for public tools.
|
|
|
11/06/2021, 15:58
|
#18
|
elite*gold: 69
Join Date: Mar 2021
Posts: 1,097
Received Thanks: 248
|
Quote:
Originally Posted by wooferpro
FPT was known for a while, your **** is public lol. You work only on Intel cause that's what FPT only works on
50$ and 120$? Bruh you went super greedy for public tools.
|
and you use amidewin and afuwin!
40$ / $100
my prices are $10 more than your ****, and it works
|
|
|
11/06/2021, 18:09
|
#19
|
elite*gold: 111
Join Date: Jan 2021
Posts: 649
Received Thanks: 567
|
Quote:
Originally Posted by LukeManolia
and you use amidewin and afuwin!
40$ / $100
my prices are $10 more than your ****, and it works 
|
Quite bold of you to assume we use public tools. Funny thing you don't even have a spoofer, you run it manually cause all tools are public anyways. FPT is detected, and people will be banned in the next ban wave.
|
|
|
11/06/2021, 19:41
|
#20
|
elite*gold: 69
Join Date: Mar 2021
Posts: 1,097
Received Thanks: 248
|
Quote:
Originally Posted by wooferpro
Quite bold of you to assume we use public tools. Funny thing you don't even have a spoofer, you run it manually cause all tools are public anyways. FPT is detected, and people will be banned in the next ban wave.
|
kk
whatever sails your 2000+ tickets.
|
|
|
11/06/2021, 21:01
|
#21
|
elite*gold: 0
Join Date: Jun 2012
Posts: 17
Received Thanks: 3
|
Quote:
Originally Posted by Dreeny
Not that I know of, AMI was patched. Which almost all spoofers use.
|
Well, actually no,
for AMD users it would require to disable fTPM, swapping the CPU (because of fTPM, module in Embedded in the CPU) and then flashing bios / Edit serials via AMI (EFI) then spoofing the rest of the system (NIC etc...)
For Intel it depends on if your TPM module is soldered to the Mobo, a swapable chip (check for an SPI interface) or fTPM (Cpu bound) , swaping the TPM Module (resolder an identical one or swap the SPI TPM module), then the rest is like before.
but either ways, you'll still need to clean everything from windows, licence, drives...
As far as i remember, the last mobo i had with a SPI interface chip was an Asus Z170 (intel 6th or 7th gen idk) which had a 14 pin TPM 1.2 module (which can be swapped with a 2.0 module)
The reasoning behind this is, when you enable TPM, it have an identifier (Which is readable), some space to store keys and infos and a "global?" key, the key is not known to you, the Identifier isn't editable from the module without breaking the fuse (afaik, correct me if i am wrong) so, unless you can edit the identifier from your TPM module and wipe, you have to swap it, this MIGHT be why AMI doesn't work anymore.
Last solution would clear the TPM module ? because you can, and it might reset your "OwnerAuth" ID ? but some people with laptop might have enforced policies on TPM with factory keys (OwnerClearDisabled True) which would require hammering the codes AND locking the module due to the locked state, but you can check it with Get-Tpm in powershell.
And also it have a serial number (Get-TpmEndorsementKeyInfo)
here's some useful informations and documentation on TPM and their specifications :
For people willing to "find out", riot might store data inside it, i neither have the time or the required skill to physicaly reverse this, have fun with that.
|
|
|
11/06/2021, 22:03
|
#22
|
elite*gold: 69
Join Date: Mar 2021
Posts: 1,097
Received Thanks: 248
|
Quote:
Originally Posted by iCheeRy
Well, actually no,
for AMD users it would require to disable fTPM, swapping the CPU (because of fTPM, module in Embedded in the CPU) and then flashing bios / Edit serials via AMI (EFI) then spoofing the rest of the system (NIC etc...)
For Intel it depends on if your TPM module is soldered to the Mobo, a swapable chip (check for an SPI interface) or fTPM (Cpu bound) , swaping the TPM Module (resolder an identical one or swap the SPI TPM module), then the rest is like before.
but either ways, you'll still need to clean everything from windows, licence, drives...
As far as i remember, the last mobo i had with a SPI interface chip was an Asus Z170 (intel 6th or 7th gen idk) which had a 14 pin TPM 1.2 module (which can be swapped with a 2.0 module)
The reasoning behind this is, when you enable TPM, it have an identifier (Which is readable), some space to store keys and infos and a "global?" key, the key is not known to you, the Identifier isn't editable from the module without breaking the fuse (afaik, correct me if i am wrong) so, unless you can edit the identifier from your TPM module and wipe, you have to swap it, this MIGHT be why AMI doesn't work anymore.
Last solution would clear the TPM module ? because you can, and it might reset your "OwnerAuth" ID ? but some people with laptop might have enforced policies on TPM with factory keys (OwnerClearDisabled True) which would require hammering the codes AND locking the module due to the locked state, but you can check it with Get-Tpm in powershell.
https://docs.microsoft.com/en-us/pow...sserver2019-ps
And also it have a serial number (Get-TpmEndorsementKeyInfo)
here's some useful informations and documentation on TPM and their specifications :
https://blog.fpmurphy.com/2017/03/ue...-2-0-pcrs.html
https://trustedcomputinggroup.org/wp...5p_r14_pub.pdf
For people willing to "find out", riot might store data inside it, i neither have the time or the required skill to physicaly reverse this, have fun with that.
|
isnt tpm, i have tested ami spoof on a user without a tpm chip installed.
got banned after 30min of afking in lobby.
|
|
|
11/06/2021, 22:20
|
#23
|
elite*gold: 0
Join Date: Jun 2012
Posts: 17
Received Thanks: 3
|
Quote:
Originally Posted by LukeManolia
isnt tpm, i have tested ami spoof on a user without a tpm chip installed.
got banned after 30min of afking in lobby.
|
Well, i am neither banned from valorant or ever got banned from it (after beta) so far as i don't cheat anymore on valo.
i would check :
- if vanguard audit the network (checking for devices and logging them)
- if it is hooking upnp devices ? (For uniqueID of each devices)
(i know they aren't IP banning because of the risk of dynamic IP allocations, but they could log it along the SN of every devices to create a sort of "Risk Score" )
After that it is completely black magic to me, as i am not experienced or ever reversed vanguard myself (but i'd might give an eye in the future)
|
|
|
11/06/2021, 22:24
|
#24
|
elite*gold: 69
Join Date: Mar 2021
Posts: 1,097
Received Thanks: 248
|
Quote:
Originally Posted by iCheeRy
Well, i am neither banned from valorant or ever got banned from it (after beta) so far as i don't cheat anymore on valo.
i would check :
- if vanguard audit the network (checking for devices and logging them)
- if it is hooking upnp devices ? (For uniqueID of each devices)
(i know they aren't IP banning because of the risk of dynamic IP allocations, but the could log it along the SN of every devices to create a sort of "Risk Score" )
After that it is completely black magic to me, as i am not experienced or ever reversed vanguard myself (but i'd might give an eye in the future)
|
drop your discord, and ill follow u up there.
// no they dont hook upnp devices.
/ i have changed network adapters and tried ami spoof, still doesnt work.
|
|
|
11/06/2021, 22:46
|
#25
|
elite*gold: 0
Join Date: Jun 2012
Posts: 17
Received Thanks: 3
|
Quote:
Originally Posted by LukeManolia
drop your discord, and ill follow u up there.
// no they dont hook upnp devices.
/ i have changed network adapters and tried ami spoof, still doesnt work.
|
Sent you a DM, but i am sure i won't be that helpful for ya.
Also, i do have a gigabyte mobo that is currently banned (it got banned due to Hardware / PciScreamer tests last month) and i use it as a server, it have TPM2.0 (cuz Ryzen 5 2600 have fTPM) so if it was network related i would be banned anyway now that i think about it, i could run some testing on it on my side.
|
|
|
11/07/2021, 00:53
|
#26
|
elite*gold: 69
Join Date: Mar 2021
Posts: 1,097
Received Thanks: 248
|
well im completely lost, i succesfully flashed a spoofed bios rom thats signed, but i still got banned
|
|
|
11/14/2021, 01:41
|
#27
|
elite*gold: 0
Join Date: Nov 2021
Posts: 3
Received Thanks: 0
|
I can help anyone just depends on your motherboard.. add me on discord allstar#0001
|
|
|
11/26/2023, 19:02
|
#28
|
elite*gold: 0
Join Date: Jul 2023
Posts: 10
Received Thanks: 2
|
AMD CPUE
Quote:
Originally Posted by iCheeRy
Well, actually no,
for AMD users it would require to disable fTPM, swapping the CPU (because of fTPM, module in Embedded in the CPU) and then flashing bios / Edit serials via AMI (EFI) then spoofing the rest of the system (NIC etc...)
For Intel it depends on if your TPM module is soldered to the Mobo, a swapable chip (check for an SPI interface) or fTPM (Cpu bound) , swaping the TPM Module (resolder an identical one or swap the SPI TPM module), then the rest is like before.
but either ways, you'll still need to clean everything from windows, licence, drives...
As far as i remember, the last mobo i had with a SPI interface chip was an Asus Z170 (intel 6th or 7th gen idk) which had a 14 pin TPM 1.2 module (which can be swapped with a 2.0 module)
The reasoning behind this is, when you enable TPM, it have an identifier (Which is readable), some space to store keys and infos and a "global?" key, the key is not known to you, the Identifier isn't editable from the module without breaking the fuse (afaik, correct me if i am wrong) so, unless you can edit the identifier from your TPM module and wipe, you have to swap it, this MIGHT be why AMI doesn't work anymore.
Last solution would clear the TPM module ? because you can, and it might reset your "OwnerAuth" ID ? but some people with laptop might have enforced policies on TPM with factory keys (OwnerClearDisabled True) which would require hammering the codes AND locking the module due to the locked state, but you can check it with Get-Tpm in powershell.
And also it have a serial number (Get-TpmEndorsementKeyInfo)
here's some useful informations and documentation on TPM and their specifications :
For people willing to "find out", riot might store data inside it, i neither have the time or the required skill to physicaly reverse this, have fun with that.
|
Does this mean then once you change CPU for AMD user,, Ftpm should reset and If spoofed everything again should be able to play valorant?
|
|
|
11/26/2023, 23:58
|
#29
|
elite*gold: 26
Join Date: Jul 2023
Posts: 528
Received Thanks: 95
|
Quote:
Originally Posted by wiredxx
Your spoofer is only spoofing motherboard and NIC and you say changing disks and motherboard wont work? 
|
Motherboard and disk doesnt always work indeed, as for some users they would need a new CPU as well like AMD ones, due to fTPM.
|
|
|
11/27/2023, 13:26
|
#30
|
elite*gold: 105
Join Date: Jul 2022
Posts: 554
Received Thanks: 90
|
Yeah generally nowadays I would recommend to replace your TPM chip in the worst case scenario. However, trying a permanent spoofer wouldn't hurt
|
|
|
All times are GMT +1. The time now is 22:14.
|
|