Cheat Engine: Beating the Final Game (tutorial 10) - Game Hacking Series

Sdílet
Vložit
  • čas přidán 22. 07. 2024
  • 🎮🕹 Learn the basics of Game Hacking. In this video, we'll finish the mini-game that concludes the Cheat Engine 7.5 tutorial series. The game contains three levels and will require us to apply techniques we've learnt throughout the series. If you missed steps 1-9, be sure to check to full playlist! #BugBounty #GameHacking #CheatEngine #Tutorial
    Check the full video playlist HERE: • Game Hacking
    Overview:
    0:00 Intro
    0:22 Cheat Engine Official Mini-Game
    0:40 Level 1: Value Freezing / Instruction Patching
    5:35 Level 2: Code Injection / Shared Code
    12:05 Level 3: Fly Hack / Freeze NPCs
    17:00 Conclusion
    A list of useful game hacking resources (bug bounty programs, key hunters, bug reports, tutorials/guides, video creators, related research, vulnerable games, tools, ctf writeups etc) - github.com/Crypto-Cat/CTF/tre...
    🧑‍💻 Looking to try game hacking and score some bug bounties? check out the active programs @ go.intigriti.com/register 💜
    👾 Join our Discord - go.intigriti.com/discord
    🎙️ This show is hosted by / _cryptocat ( ‪@_CryptoCat‬ ) & / intigriti
    👕 Do you want some Intigriti Swag? Check out swag.intigriti.com

Komentáře • 36

  • @_nicecap
    @_nicecap Před rokem +5

    I was training the cheat engine in a game called Salt and Sanctuary, and what drew my attention to this game is that the script can only be activated after the action in question has been performed at least once within the game, for example, if I want to activate a "One Hit Kill" script, I must first hit some mob. It's as if the address appears only after I hit the mob. Have you ever seen anything like this before?

    • @intigriti
      @intigriti  Před rokem

      Interesting! Every game is a little different, depending on how the devs designed/coded it. Sounds like the game may only instantiate the health object/property after you first attack a mob in this case.

    • @DatBoi_TheGudBIAS
      @DatBoi_TheGudBIAS Před rokem

      Yes, I've seen something kinda similar, actually in the tutorial.
      I was too lazy so I found the pointer of step 6 and tried a direct change to it's value via a script, however, the pointer will only enable when I rech step 6, so enabling the script earlier will write 5000 into an invalid adress, Wich crashes the tutorial.

  • @Lothar-yq7uq
    @Lothar-yq7uq Před 28 dny

    man this banger song brings back soo many memories 🥲

  • @md.omarsharafi7528
    @md.omarsharafi7528 Před rokem +2

    This is may be one of the most beautiful types of hacking. Thank you so much. I have watched the whole series twice. Please make some videos on hacking android games and online games. 🙏🙏

    • @intigriti
      @intigriti  Před rokem

      Thank you 🙏🥰 I have to be careful around online (multiplayer) games unfortunately but definitely will look at some more tools/techniques in future videos and android games is on the list 😉

  • @Tom-vx7bs
    @Tom-vx7bs Před 7 měsíci

    we hope that in the near future a way will be found to hide the values of the games within the servers themselves via the server controller virus injector

  • @tivi9108
    @tivi9108 Před rokem +3

    find cheat engine pointer on epsxe???

    • @intigriti
      @intigriti  Před rokem

      Should be possible to use cheat engine on emulators but our goal is really just to show the core techniques, it's up to you to adapt them to your use case 😉 Cheat engine won't always do the job, as there's many other game hacking methods: github.com/Crypto-Cat/CTF/tree/main/game_hacking#readme

    • @DatBoi_TheGudBIAS
      @DatBoi_TheGudBIAS Před rokem

      U need to enable some specific settings to be able to work in emulators

  • @deniss8892
    @deniss8892 Před 11 měsíci

    Consider the following scenario: we are receiving data from an API and have encountered a new data instance.
    In this particular case, we are faced with a challenge: the originator of a specific value is unknown, and we are unable to locate the corresponding pointer.
    Are there any viable solutions to address this situation?

    • @intigriti
      @intigriti  Před 11 měsíci

      Hmmm good question 🤔 Perhaps you could use the dissector to see what data structures the instance might compose of. So far, my experience of looking for memory values has been quite clear cut, e.g. i want the the health value so performing some actions that impact the health will make it clearly identifiable.

  • @AngelPenaranda
    @AngelPenaranda Před 5 měsíci

    Thanks for the tutorials, Can you make one for Lords of the Fallen 2024

    • @intigriti
      @intigriti  Před 5 měsíci

      No problem! We don't make tutorials for specific games because there's so many, they will all work differently etc. We'd encourage you to try and apply some of these techniques to other games yourself! 😉

  • @childdori3901
    @childdori3901 Před rokem +1

    Will you do a cheat engine tutorial on packet editing?

    • @intigriti
      @intigriti  Před rokem +3

      I definitely plan to do some more game hacking videos in the coming months! Packet analysis/manipulation and DLL injection will be covered 😊

  • @ahmedgames9335
    @ahmedgames9335 Před rokem

    hi, i find that i can write asm code using write_bytes() function in pymem, I wonder if the address that i want to rewrite the asm code have one line and i want to replace it with two line Or in the correct sense more bytes more then the original what will happend it will take from the following address and how can i solve it .

    • @intigriti
      @intigriti  Před rokem +1

      The principle would be the same as cheat engine, i.e. if you are only modifying instructions (changing bytes, not adding) then it will be fine. If you want to insert extra instructions, you'll need to make a code cave (carve out some memory space for your additional bytes). I'll update this series soon with some python/c# game hacks 😉

    • @ahmedgames9335
      @ahmedgames9335 Před rokem

      @@intigriti Yes I found web site about the cave and I was tried it with python it work and I understood what cave do , I have a lot of questions I hope find it in your coming videos, just one thinking stopped me when I tried to but NOP in Some address I get error and in site I get that I need to use Virtual Protect I think to take permission to edit on this address but I did not found it in pymem and I searched i never found it

    • @ahmedgames9335
      @ahmedgames9335 Před rokem

      @@intigriti And I'm excited for the next videos

    • @ahmedgames9335
      @ahmedgames9335 Před rokem +1

      I have question on cave 😅, we search in process memory for a an empty address for write our cave code In Python by pymem library if I allocated with it it will be in same process memory or out side the process ?

    • @ahmedgames9335
      @ahmedgames9335 Před rokem

      Finally, I 🎉🎉🎉 I Do It I Created Menu With Flutter It Is Amazing

  • @megatron5794
    @megatron5794 Před rokem

    I am getting an error while opening this process while opening the application, how can we fix this?

  • @gururajsuresh4351
    @gururajsuresh4351 Před rokem +1

    Can cheat engine be used with server side game?

    • @intigriti
      @intigriti  Před rokem +1

      Good question! It really depends on the game and what kind of server-side validation they use. For example, if you modify your health, score, ammo etc locally.. will the server simply accept the new value? Or, will it see your health/score/ammo and say "hang on, that's not the same as the value i have recorded for you, from 5 seconds ago.. CHEATER!". In some cases, some values may not be stored on the server at all, e.g. it might only track your score, but the health/ammo is all client-side 🙂

  • @ahmedgames9335
    @ahmedgames9335 Před rokem

    In Your Coming Can You Explain How To Write Code Cave For The Instruction That Have Address Changing Each Time I Open The Process. I Have arrvied to Two Offsets For the address instruction and when i follow the pointer and add BrackPointer The BrackPointer Catch Alot Of Other Thinks So It Be More Hard, 🍃 I Just See How You Do This

    • @intigriti
      @intigriti  Před rokem

      Hmmm if the instruction address is changing, maybe you could search for an Array of Bytes (AOB) instead? That will use the pattern of the bytes as a signature so shouldn't be reliant on the location.

  • @DatBoi_TheGudBIAS
    @DatBoi_TheGudBIAS Před rokem +2

    Hope u deal with the integrity check. There's some ways I saw, but some are pretty hard, I like simple ways. Try to cover a simple way and a hard way for the integrity check

    • @intigriti
      @intigriti  Před rokem +1

      Thanks, it's definitely on the cards but I don't think I can show that for a real game. I'll probably need to make or find a simple challenge that can demonstrate the technique.

    • @DatBoi_TheGudBIAS
      @DatBoi_TheGudBIAS Před rokem +1

      @@intigriti nono, im talking about the cheat engine integrity check, the minigames have an integrity check after u complete them iirc

    • @intigriti
      @intigriti  Před rokem

      Oh, interesting 🤔 I didn't notice that on any issues related to an integrity check when I was completing the minigames 😕

  • @oky849
    @oky849 Před rokem +2

    Game 7ds grand cros sir

    • @intigriti
      @intigriti  Před rokem

      We picked cave crawler for these videos for a few reasons; it's a small game with no multiplayer, no in-game purchases etc. Rather than showing all the same techniques on different games, our goal is to provide an overview so that you can apply what you've learned to any game! Just remember to stick to single player / free games for your own learning OR look at bug bounty programs for multiplayer stuff (ensuring to carefully observe the rules of engagement and scope) 😊