Cheat Engine: Beating the Final Game (tutorial 10) - Game Hacking Series
Vložit
- čas přidán 22. 07. 2024
- 🎮🕹 Learn the basics of Game Hacking. In this video, we'll finish the mini-game that concludes the Cheat Engine 7.5 tutorial series. The game contains three levels and will require us to apply techniques we've learnt throughout the series. If you missed steps 1-9, be sure to check to full playlist! #BugBounty #GameHacking #CheatEngine #Tutorial
Check the full video playlist HERE: • Game Hacking
Overview:
0:00 Intro
0:22 Cheat Engine Official Mini-Game
0:40 Level 1: Value Freezing / Instruction Patching
5:35 Level 2: Code Injection / Shared Code
12:05 Level 3: Fly Hack / Freeze NPCs
17:00 Conclusion
A list of useful game hacking resources (bug bounty programs, key hunters, bug reports, tutorials/guides, video creators, related research, vulnerable games, tools, ctf writeups etc) - github.com/Crypto-Cat/CTF/tre...
🧑💻 Looking to try game hacking and score some bug bounties? check out the active programs @ go.intigriti.com/register 💜
👾 Join our Discord - go.intigriti.com/discord
🎙️ This show is hosted by / _cryptocat ( @_CryptoCat ) & / intigriti
👕 Do you want some Intigriti Swag? Check out swag.intigriti.com
I was training the cheat engine in a game called Salt and Sanctuary, and what drew my attention to this game is that the script can only be activated after the action in question has been performed at least once within the game, for example, if I want to activate a "One Hit Kill" script, I must first hit some mob. It's as if the address appears only after I hit the mob. Have you ever seen anything like this before?
Interesting! Every game is a little different, depending on how the devs designed/coded it. Sounds like the game may only instantiate the health object/property after you first attack a mob in this case.
Yes, I've seen something kinda similar, actually in the tutorial.
I was too lazy so I found the pointer of step 6 and tried a direct change to it's value via a script, however, the pointer will only enable when I rech step 6, so enabling the script earlier will write 5000 into an invalid adress, Wich crashes the tutorial.
man this banger song brings back soo many memories 🥲
This is may be one of the most beautiful types of hacking. Thank you so much. I have watched the whole series twice. Please make some videos on hacking android games and online games. 🙏🙏
Thank you 🙏🥰 I have to be careful around online (multiplayer) games unfortunately but definitely will look at some more tools/techniques in future videos and android games is on the list 😉
we hope that in the near future a way will be found to hide the values of the games within the servers themselves via the server controller virus injector
find cheat engine pointer on epsxe???
Should be possible to use cheat engine on emulators but our goal is really just to show the core techniques, it's up to you to adapt them to your use case 😉 Cheat engine won't always do the job, as there's many other game hacking methods: github.com/Crypto-Cat/CTF/tree/main/game_hacking#readme
U need to enable some specific settings to be able to work in emulators
Consider the following scenario: we are receiving data from an API and have encountered a new data instance.
In this particular case, we are faced with a challenge: the originator of a specific value is unknown, and we are unable to locate the corresponding pointer.
Are there any viable solutions to address this situation?
Hmmm good question 🤔 Perhaps you could use the dissector to see what data structures the instance might compose of. So far, my experience of looking for memory values has been quite clear cut, e.g. i want the the health value so performing some actions that impact the health will make it clearly identifiable.
Thanks for the tutorials, Can you make one for Lords of the Fallen 2024
No problem! We don't make tutorials for specific games because there's so many, they will all work differently etc. We'd encourage you to try and apply some of these techniques to other games yourself! 😉
Will you do a cheat engine tutorial on packet editing?
I definitely plan to do some more game hacking videos in the coming months! Packet analysis/manipulation and DLL injection will be covered 😊
hi, i find that i can write asm code using write_bytes() function in pymem, I wonder if the address that i want to rewrite the asm code have one line and i want to replace it with two line Or in the correct sense more bytes more then the original what will happend it will take from the following address and how can i solve it .
The principle would be the same as cheat engine, i.e. if you are only modifying instructions (changing bytes, not adding) then it will be fine. If you want to insert extra instructions, you'll need to make a code cave (carve out some memory space for your additional bytes). I'll update this series soon with some python/c# game hacks 😉
@@intigriti Yes I found web site about the cave and I was tried it with python it work and I understood what cave do , I have a lot of questions I hope find it in your coming videos, just one thinking stopped me when I tried to but NOP in Some address I get error and in site I get that I need to use Virtual Protect I think to take permission to edit on this address but I did not found it in pymem and I searched i never found it
@@intigriti And I'm excited for the next videos
I have question on cave 😅, we search in process memory for a an empty address for write our cave code In Python by pymem library if I allocated with it it will be in same process memory or out side the process ?
Finally, I 🎉🎉🎉 I Do It I Created Menu With Flutter It Is Amazing
I am getting an error while opening this process while opening the application, how can we fix this?
What's the error? 🤔
Can cheat engine be used with server side game?
Good question! It really depends on the game and what kind of server-side validation they use. For example, if you modify your health, score, ammo etc locally.. will the server simply accept the new value? Or, will it see your health/score/ammo and say "hang on, that's not the same as the value i have recorded for you, from 5 seconds ago.. CHEATER!". In some cases, some values may not be stored on the server at all, e.g. it might only track your score, but the health/ammo is all client-side 🙂
In Your Coming Can You Explain How To Write Code Cave For The Instruction That Have Address Changing Each Time I Open The Process. I Have arrvied to Two Offsets For the address instruction and when i follow the pointer and add BrackPointer The BrackPointer Catch Alot Of Other Thinks So It Be More Hard, 🍃 I Just See How You Do This
Hmmm if the instruction address is changing, maybe you could search for an Array of Bytes (AOB) instead? That will use the pattern of the bytes as a signature so shouldn't be reliant on the location.
Hope u deal with the integrity check. There's some ways I saw, but some are pretty hard, I like simple ways. Try to cover a simple way and a hard way for the integrity check
Thanks, it's definitely on the cards but I don't think I can show that for a real game. I'll probably need to make or find a simple challenge that can demonstrate the technique.
@@intigriti nono, im talking about the cheat engine integrity check, the minigames have an integrity check after u complete them iirc
Oh, interesting 🤔 I didn't notice that on any issues related to an integrity check when I was completing the minigames 😕
Game 7ds grand cros sir
We picked cave crawler for these videos for a few reasons; it's a small game with no multiplayer, no in-game purchases etc. Rather than showing all the same techniques on different games, our goal is to provide an overview so that you can apply what you've learned to any game! Just remember to stick to single player / free games for your own learning OR look at bug bounty programs for multiplayer stuff (ensuring to carefully observe the rules of engagement and scope) 😊