Reverse assistive technology ----- detection game

We talk about the game detects
Although the game is difficult to detect a few minutes or a few hundred words is finished, but we can simply tell us about the kind of detection.

1. Some friends always ask: easy language how I always used to write code is detected, and the next Pharaoh in C ++, no problem, what our data are similar ah. Easy language features significantly easier to detect this is an indisputable fact that, so you have to pay more attention to the protection of your DLL your EXE, this is no way to do.

2. Detection party software, in fact, is to detect the EXE or DLL in turn is intercepted or your injection. Hidden EXE, DLL-free modular, choose the best injection method, it is a good choice.

3.CRC, game code for tampering detection, many unscrupulous plug will aim to reach tampering and tampering with the game code game logic implemented plug abnormal function.
This plug-in no matter what the situation is, its implementation principle is fixed, jump or modify the HOOK, it will inevitably lead to the destruction of their game code, CRC detection can check whether the code has been tampered with, to achieve detection, combat the solution is accessible in the corresponding code address off track CRC, skip the CRC.

4. data detection, the examples in this article is the last data detection, you can view details

5. Stack detection, many will ask, when just learning stack: a return to a stack inside what is the meaning ah? Note that in the OD of a return to what one is, what he is before the upper function into the body of the function, push the stack into the EIP, said the popular straightforward point is that we meet to walk the fork in the road signs, these returns back to let us know road. Similarly, he is also an important means of tracking sources, he let us know that you are never, for example, we send return catch function CALL.

Well, then, more than you will use, detection can also use this game, you call CALL games, game call test to see who is calling me, ah, ah? A module does not know is calling me! Then you are detected, remedies, fake stack, forged how many layers? You might as well ask him how many layers of detection, then I forged many layers.

Many types of testing, not to enumerate
instances give you an over-the-horizon radio here
only for the exchange of learning

https://pan.baidu.com/s/1i5lBH8D
Password: d9dv
if this instance violated the interests of the original author
, please contact me delete

Released eight original articles · won praise 0 · Views 88

Guess you like

Origin blog.csdn.net/qq_41697345/article/details/104757852