00:00:00
hello everybody today I'm going to go in
00:00:02
depth into every video game hacking
00:00:04
technique out there this video is
00:00:06
perfect for beginners getting into game
00:00:07
hacking or just anyone wanting to learn
00:00:10
all the known methods of bypassing
00:00:11
anti-cheats in depth let's begin with a
00:00:14
basic overview of game hacking game
00:00:17
hacking is all about exploiting a game's
00:00:19
weaknesses to gain unfair advantages
00:00:21
like using cheats for extra abilities or
00:00:23
automating actions hackers constantly
00:00:26
find new ways to bypass anti-che systems
00:00:29
while Developers work to block them in
00:00:31
this video I'm going to be breaking down
00:00:33
the key techniques used in this ongoing
00:00:35
battle the first and most powerful
00:00:37
method of game hacking is internal
00:00:39
cheats internal cheats are programs or
00:00:41
code that are injected directly into a
00:00:43
game's process since they are part of
00:00:46
the game's memory space they have full
00:00:48
control over everything the game does
00:00:50
this is incredibly powerful because the
00:00:52
chi acts like a native part of the game
00:00:54
allowing it to bypass certain
00:00:56
restrictions to inject an internal cheat
00:00:59
a method called D injection is used a d
00:01:02
Dynamic link library is a file that
00:01:05
contains code and data that can be used
00:01:07
by multiple programs at the same time
00:01:09
the injection process involves loading
00:01:11
the dll into the game's memory granting
00:01:14
the chi access to the game's internal
00:01:16
functions however anti cheets can detect
00:01:19
this by monitoring the loaded modules
00:01:22
for instance if a game finds a module in
00:01:24
memory that doesn't belong like a dll
00:01:27
cheat it Flags it as suspicious games
00:01:30
like csgo have even blocked all D
00:01:32
injections hackers responded by using
00:01:35
methods like manual mapping which
00:01:37
emulates the D loading process but
00:01:39
avoids being listed in the game's loaded
00:01:41
modules making detection
00:01:43
harder the second method are external
00:01:46
cheats external cheats run separately
00:01:49
from the game but still manipulate the
00:01:50
game's memory this method doesn't
00:01:52
directly alter the game's process making
00:01:55
it less detectable external cheats
00:01:57
interact with the game's memory by
00:01:59
opening a handle to the game process
00:02:01
using Windows API functions like read
00:02:04
process memory and WR process memory
00:02:06
these functions allow the cheat to read
00:02:08
from and modify the game's memory
00:02:10
without being a part of the game however
00:02:12
external cheats have their challenges
00:02:14
external cheats are easier to detect
00:02:16
because they rely on common Windows
00:02:18
functions user mode anti-cheats which
00:02:21
don't have deep system privileges often
00:02:23
block external Cheats by hooking these
00:02:25
API functions for example they hook open
00:02:28
process to prevent cheats from getting
00:02:30
access to the game's memory in the first
00:02:31
place the third method is dma based
00:02:34
cheats dma based cheats use external
00:02:37
hardware devices to access game memory
00:02:39
directly without involving the CPU or
00:02:41
operating system this makes it extremely
00:02:44
hard for software-based anticheats to
00:02:46
detect it EMA is a technology that
00:02:48
allows peripherals like network cards to
00:02:51
communicate directly with the system's
00:02:53
memory by passing the CPU dma sheets use
00:02:56
the same principle our Hardware device
00:02:58
is plugged into the computer's pcie slot
00:03:01
and then connected to a separate
00:03:02
computer the second computer can
00:03:05
directly read and write the game's
00:03:06
memory without any cheat software
00:03:07
running on the actual PC itself since no
00:03:11
cheat software is running on the gaming
00:03:12
computer traditional anti-cheats can't
00:03:14
detect it however dma cheets require
00:03:17
expensive hardware and a second computer
00:03:19
to run the hack making it less
00:03:21
accessible to Casual hackers method
00:03:23
number four is hooking hooking refers to
00:03:26
modifying or intercepting API calls or
00:03:29
game functions to control or alter their
00:03:31
behavior it's a common technique used by
00:03:34
both cheats and by anti-cheats hackers
00:03:36
use hooking to override certain game or
00:03:39
system functions for example a cheat
00:03:41
might hook the game's rendering function
00:03:43
to create an ESP overlay showing the
00:03:45
player where enemies are anti- cheets
00:03:48
also use hooking but in Reverse they
00:03:50
hook critical Windows functions like low
00:03:52
Library which is used to inject DS or
00:03:55
open process which is used to manipulate
00:03:57
memory preventing cheats from using
00:03:59
these functions to gain access to the
00:04:01
game one way to bypass anti-che hooks is
00:04:04
by not using the hooked functions at all
00:04:06
techniques like manual mapping avoid the
00:04:08
need for load Library making it harder
00:04:11
for the anti-che to block the cheat the
00:04:13
fifth method is Kernel level cheats
00:04:15
kernel level cheats typically use custom
00:04:18
drivers or exploit vulnerabilities in
00:04:20
existing drivers to execute their code
00:04:22
in kernel mode the chi installs a
00:04:25
malicious driver that interacts directly
00:04:27
with the game's process memory or even
00:04:29
Hardware making it much harder for user
00:04:32
level anti-che programs to detect once
00:04:34
running at this level cheat has full
00:04:36
access to read and write memory
00:04:38
manipulate input devices for example
00:04:41
simulating Mouse movements for Aimbot
00:04:43
and modifying critical game functions
00:04:45
without raising
00:04:46
alarms some chronal level cheats are so
00:04:49
Advanced that they can hide themselves
00:04:51
in processes they can mask their
00:04:53
presence from antiche programs by
00:04:55
controlling what processes are visible
00:04:57
at the user level thus making detection
00:04:59
much more challenging you can also load
00:05:02
custom or compromise driver and the chi
00:05:04
can gain access to the game's memory and
00:05:06
resources via the driver kernel level
00:05:09
cheats don't come without their
00:05:10
challenges though modern anti-che
00:05:12
systems are increasingly moving to
00:05:14
Kernel level detection themselves like
00:05:16
Riot Vanguard or easy antiche making
00:05:19
this method much more difficult to pull
00:05:21
off floating unsigned drivers or
00:05:24
improperly written code can also lead to
00:05:26
system instability and crashes hackers
00:05:29
may need to exploit vulnerabilities in
00:05:30
the operating system or Hardware
00:05:33
successfully install and run their
00:05:34
drivers without triggering detection
00:05:36
mechanisms the sixth and probably least
00:05:39
common method is the virtual machine
00:05:41
based cheat a virtual machine based
00:05:43
cheat uses hardware virtualization to
00:05:46
create an isolated environment where the
00:05:48
game runs inside a virtual machine while
00:05:50
the cheat runs outside in the host
00:05:53
System since the cheat operates outside
00:05:55
the virtualized environment it can
00:05:57
monitor and manipulate the game without
00:05:59
but ever directly interacting with the
00:06:01
game's process or memory from within
00:06:03
guest OS making it difficult for antiche
00:06:06
systems to detect a hypervisor is used
00:06:09
to run the game inside a virtual machine
00:06:11
and this hypervisor has full control
00:06:13
over the virtual machine's memory CPU
00:06:16
State the cheat can then read the memory
00:06:18
of the VM extracting useful information
00:06:21
like player locations or in-game
00:06:23
variables by staying outside the
00:06:25
virtualized environment the cheat
00:06:26
remains hidden from user mode anti-che
00:06:28
software running in inside the VM like
00:06:30
the other methods this doesn't come
00:06:32
without its challenges setting up a VM
00:06:34
based cheat requires knowledge of
00:06:36
virtualization Technologies and
00:06:38
hypervisor programming there is also a
00:06:41
performance overhead when running games
00:06:43
inside virtual machines although
00:06:45
Hardware assisted virtualization like
00:06:47
Intel VTX or amdv helps mitigate this
00:06:51
furthermore some anti-che systems are
00:06:53
starting to detect when games are run
00:06:55
inside virtual machines flagging this is
00:06:58
suspicious please like And subscribe if
00:07:00
you enjoyed the video um I'm going to be
00:07:02
making more videos like this in the
00:07:03
future and teaching you guys how to
00:07:05
actually make these so stay subscribed