2. C++ anti-cheating combat (advanced chapter - 17. How to protect code segments with memory verification and resist remote thread injection)

  This chapter will focus on how to use memory verification to prevent third-party modules or auxiliary software from restoring our HOOK or tampering with any code segment. The whole supporting process is in the 2.17 directory. All content in this column is for learning reference only. No nonsense!

1. Use IDA to find the signature

  Here we simulated WG to crack our core check function. He used the feature code to find the address of the StartCheckWhite function, and then forced to write a new machine code to make him return TRUE, which will cause us to never be able to detect illegal CALL. Plug-in download address , refer to the code in the link below for details:

https://www.52pojie.cn/thread-282441-1-1.htmlhttps://www.52pojie.cn/thread-282441-1-1.html

Guess you like

Origin blog.csdn.net/wangningyu/article/details/123215975