Quote:
Originally Posted by 'iksde
In my view learning how to use CE e.g. for pointer scanning is also for newbies to this topic feasible.
But I think for bypassing (good) anti cheat systems, it's a longer way.
Since the change from apex (new bypass methods were coming out fast if I remember correctly and GameGuard was the easiest thing) to xigncode and the significance of cshell I've lost sight for wolfteam game hacking because I stopped myself playing it.
From what I see today, is that xigncode seems to be a hard one.
GZN is offline (sadly and it seems that b6ooy never wants to reopen it) and I don't really find many information about it. I'm not talking about C&P code, but at the older times there were more interesting things about that released.
I've never done anything with bypassing and have only used finished releases and done my memory scanning and coding in vc++ at myself, so yea - for somebody who doesn't know much about that topic it seems to be hard.
And I think one problem to learn it is how I mentioned the less becoming information and harder tasks like bypassing xigncode (and as a logical consequence, not everybody wants to release their findings).
If you've got some tipps on how to start on it - and yea, no C&P shit but just something/specific topics related to it - to start on, I would look forward if you can tell me/us about it.
|
Option 1.
If you want to make CE undetected without touching XignCode, your only option is to grab the CE source from

and modify it ALLOT, for instance they detect the layout of CE, change it, they detect Window name, process name and allot more.
Option 2.
If you simply want to prevent them from minimizing CE window, all you have to do is hook 'ShowWindow' in user32.dll and if param 1 (HWND) is CE's HWND you simply return TRUE; However after a few minutes (if not instantly) you will still get kicked since you triggered their detection.
Option 3.
This is what I call the 'Half-Bypass' as it's not a full one.
Follow steps in Option 1, now if it's undetected you'll notice you can't view the process at all. Well, this is because of their driver, it's fairly easy to bypass this limitation.
For this we need to hook 'StartService' in their x3.xem, getting the StartService address, is not the easy part, since they use Themida which relocates the IAT and thus StartService.
Best way to grab it is when you see the XignCode loading screen on the right is to pause the process and open CE and then Memory Viewer and CTRL+G and type in StartService, if nothing happens, resume the process for about 2 seconds then pause it again and you now should get the StartService address in CE. Grab it, hook it there and return TRUE; We don't need to check the handle here because only xigncode uses this and we don't want their drivers running.
That's it, you can now hack for a (un)limited amount of time (depending if they check their driver)
Option 4.
Use your own internal memory scanner.
This is what I do.
Hope I helped