sábado, 3 de junho de 2023

Hacking Freemium Games - The Evolution Of PC Game Cheating

This post is going to be a rather strange post compared to previous ones. But bear with me, in the middle of the post you will see why this post fits the IT security topic.

I'm also terribly sorry for not posting recently, but I was busy with my SPSE and SLAE certification. Both are recommended for Python and Assembly noobs like me. But back to this post.

A little bit of history

Cheating in games started as help for game testers. By using invincibility or infinite ammo testers were able to test the game quicker, which meant less money spent on testing. I personally use cheat codes in games, depending on my mood. Sometimes it feels good to slash all the opponents while I'm invincible, sometimes it is more fun to play the game without cheats. One can argue whether cheating in games is OK or not, but I believe it depends, there is no black or white. But one thing is for sure, it is part of the gaming industry. There is huge demand for cheats. There were even cheat books printed on paper...


The different types of cheats (on PC)

There are different types of cheats in PC gaming. Following is a noncomplete list of these cheats:

Cheat codes

The good old IDDQD type of cheats. These are left in the game by the developers intentionally. Nothing interesting here.

Edit memory

This is my favorite. I will talk about this at the end of the post. Whenever a user launches a new program, the program's whole memory is accessible (read/write) to every other program launched by the user. And since the memory stores the current game state (health, ammo, armor, etc.), these values can be changed easily. In the good old times, there were POKE commands to do this cheats, and the memory address to write into was published by people who found where the game stores the most critical states about the game.

Code injection

This is like patching the game code. For example, one can change the "DEC (pointer to your current health)" instruction with NOP (do nothing), thus becoming invincible. In multi-player cheats, there is the aimbot to help you aim at enemies, wallhack to see through the wall, increase hitbox of the enemy for smoother hit, or in MMORPGs, one can write macros to collect items while the player is not online. I would say the so-called "trainers" more or less fit into this category and the previous one.

Saved game editor

The first time a kid meets a hex-editor (just like the co-author of this blog did with SIM City when he was 10 years old - David). It can teach a lot about file structures, the hexadecimal numeral system, etc. Fun times. 

Hacking game server

Not very common, but even more fun. Warning: endless trolling possibilities in multi-player games ahead :) How to hack a game server? Well, I think this might deserve another full blog post ...

Network traffic hacking

One last necessary type of cheating is to modify network traffic between the client and the game server. AFAIK SSL is not universal in gaming, so stunnel is not needed for this hack, but ettercap can help in changing the communication.

Why cheating becomes more critical (and challenging)?

Now in the age of in-app-payments, the game creators are no longer thinking about cheats as funny things but something to be destroyed to the ground. Because cheating decreases its revenue. Or not. At least they think it does. To quote Wikipedia here, "cheating in such games is nonetheless a legal grey area because there are no laws against modifying software which is already owned, as detailed in the Digital Millennium Copyright Act." 

A lot of online games include anti-cheating components like PunkBuster, nProtect GameGuard, or Valve Anti-Cheat. This whole cheating/anti-cheating industry is the same as the virus/anti-virus industry. A cat and mouse game.

Freemium games

If you have not played with "freemium" games, you should watch South Park season 18, episode 6. - "Freemium Isn't Free." If you did play with freemium games, you definitely have to watch it :) There are many problems with freemium games. It is free to install, free to play. The first 3-4 hours might be fun to play. But after that, it turns out it is impossible to advance in the game without paying money for it. And by spending cash, I mean spending a LOT! Let's have a look at today's example, an arcade racing video game.


For 99.99 USD, you can get 3 000 000 credit. For almost double the price of a new PC game, you can get these credits. In this particular game, I estimate one have to play ~6-24 hours constantly to get this amount of credit. But by playing ~6 hours, I mean 6 hours without progress in the game! Kind of boring. And what do you get from 3 000 000 credit? You can buy one of the most expensive cars, but can't tune them fully. You have to play more (without progress) or buy more. But guess what, there are more cars you can't buy by only playing the game. Those are only available via in-app-purchase.


Even though the player has 58 765 533 credits, it is not possible to buy this car. Only available through real money.


So, what are your possibilities? You are either Richie Rich, and can afford the money to buy these. Or you can be insane, and try to play the game without in-app-purchase. Or give up the game and try another freemium ... Or, you can try to hack the game!

Hack all the freemium games!

Although I was not playing this racing game from day one, I was able to witness the evolution of the cheats against this game. The cheats which worked in one day was not working one month later. The game is continuously updated to defeat the newly published cheats.

Noob start

So, I want to hack this game, what is the first thing a noob like me does? Bing it! Google it! 
From the first page result, let's check this tool:


While trying to download that, I just have to give my email address to spammers, or my mobile number will be subscribed to premium rate text messages. What fun.


Another "cheat" program will install malware/adware on your computer. Never ever try these programs. They are fake 99% of the time and after installing those you will have another problem, not just how to hack freemium games.

Beginners start - Cheat engine

When I first heard about hacking games in memory, I visualized hours of OllyDBG/ImmunityDBG/(insert your favorite Windows debugger here). It turned out, there are some specialized tools to help you with cheating the game. No assembly knowledge required. My favourite tool is CheatEngine. I highly recommend to download it and spend 10 minutes to get past the built-in tutorial levels to get a feeling about this tool. It's super duper awesome.



When I first tried to hack this game myself, I scanned the memory for my actual credit and tried to change that, no luck. Keep reading, you will see what happened.

The second cheat I tried with cheat engine was something like this
  1. Start the game, play the first level, and check how many credits is paid for winning the race. Pro tip: use dual display for full-screen game cheating.
  2. Restart the same level, attach Cheat Engine to the game's process
  3. Scan the memory for the same value at the beginning of the race
  4. Scan the memory for the same value at the end of the game. The intersect of the first and second scan includes the real value where the credit is stored for winning the race.
  5. Change the values (both the real one and some false positives) to something big
  6. Watch the game to crash
  7. Be amazed at the money you received
Nowadays, most of the cheats on YouTube does not work. Except for these kind of cheats. I don't want to recreate that tutorial, so you should watch it first then come back.



Are you back? Great. Do you have any idea what have you just seen? No? Well, in this case, don't try this at home. Copy-pasting assembly code from random internet posts and running on your computer is always a bad idea. It is precisely as risky as downloading free programs from random internet sites.

Although I have not seen people trolling others with this cheat engine type of shellcode, I think the time will come when these will be turned into something terrible. These shellcodes might work, or might harm your computer. The good news is, we can have a look at the code and analyze it. 

When you open CheatEngine and try to define a new custom type, you are greeted with a skeleton assembly code. I don't want to detail what all the skeleton code does, let's just focus on the difference between the skeleton code and the code used in the video. This is the "decrypt function":

xor eax, 0baadf00d rol eax, 0e 

What does it mean? The actual credit is encrypted in memory. If you want to scan it in memory, you won't be able to find it. But! The encryption is rotating the value to the right (ROR) with 0xE (14 in decimal), and after that, it is XOR-ed with 0xbaadf00d. Decrypting it is the inverse of the functions in reverse order (in this particular case, the order does not matter, but that's not the point). The inverse function of XOR is XOR, and the inverse function of ROR (rotate right) is ROL (rotate left). Now that we analyzed the assembly code, we can be sure that it is safe to execute. Just follow the video and see your coins falling from the sky. For free. In a freemium game. Have fun!

Encrypt memory - applications at financial institutions

Another exciting thing is that I don't recall any thick client applications in the financial industry encrypting the values in memory. And I agree, there are more significant problems with thick client applications than not encrypting the essential values in memory. But still, some thick client applications are regularly updated, maintained. Maybe it is a good idea to encrypt the values in memory. It will make attackers' life harder. Not impossible, but harder. Perhaps the developers of these applications should learn from the gaming industry (or from malware developers for that matter) because it is a shame that an arcade racing game or an FPS is protected better than an application responsible for transacting millions of dollars. Just think about the RAM scraping malware stealing millions of credit card data ...

Moral of the story

Cheating is part of the gaming history, and the freemium games are trying to take away the cheats from the gamers because they want money. Thanks to CheatEngine and some clever hacks, these programs can be still beaten. And guess what, there is CheatEngine for Android - although it did not work for me on the latest Android. And sometimes, hacking all kinds of applications can be more comfortable with CheatEngine, compared to traditional debuggers.

Also, always check the code before executing it! And when you find something cool, publish it, so everyone could enjoy the games!


Related word

Iranian Hackers Using New PowerShell Backdoor In Cyber Espionage Attacks

 


An advanced persistent threat group with links to Iran has updated its malware toolset to include a novel PowerShell-based implant called PowerLess Backdoor, according to new research published by Cybereason.

The Boston-headquartered cybersecurity company attributed the malware to a hacking group known as Charming Kitten (aka Phosphorous, APT35, or TA453), while also calling out the backdoor's evasive PowerShell execution.

"The PowerShell code runs in the context of a .NET application, thus not launching 'powershell.exe' which enables it to evade security products," Daniel Frank, senior malware researcher at Cybereason, said. "The toolset analyzed includes extremely modular, multi-staged malware that decrypts and deploys additional payloads in several stages for the sake of both stealth and efficacy."

The threat actor, which is active since at least 2017, has been behind a series of campaigns in recent years, including those wherein the adversary posed as journalists and scholars to deceive targets into installing malware and stealing classified information.


Earlier this month, Check Point Research disclosed details of an espionage operation that involved the hacking group exploiting the Log4Shell vulnerabilities to deploy a modular backdoor dubbed CharmPower for follow-on attacks.

The latest refinements to its arsenal, as spotted by Cybereason, constitutes an entirely new toolset that encompasses the PowerLess Backdoor, which is capable of downloading and executing additional modules such as a browser info-stealer and a keylogger.

Also potentially linked to the same developer of the backdoor are a number of other malware artifacts, counting an audio recorder, an earlier variant of the information stealer, and what the researchers suspect to be an unfinished ransomware variant coded in .NET.

Furthermore, infrastructure overlaps have been identified between the Phosphorus group and a new ransomware strain called Memento, which first emerged in November 2021 and took the unusual step of locking files within password-protected archives, followed by encrypting the password and deleting the original files, after their attempts to encrypt the files directly were blocked by endpoint protection.

"The activity of Phosphorus with regard to ProxyShell took place in about the same time frame as Memento," Frank said. "Iranian threat actors were also reported to be turning to ransomware during that period, which strengthens the hypothesis that Memento is operated by an Iranian threat actor."

Related posts

  1. Underground Hacker Sites
  2. Pentest Tools For Ubuntu
  3. Hacking Tools For Windows Free Download
  4. How To Install Pentest Tools In Ubuntu
  5. Hacking Tools Free Download
  6. Hacker Tools List
  7. Pentest Tools Free
  8. Hacker Tools Online
  9. Hacker Tools List
  10. Hacking Tools Software
  11. Tools 4 Hack
  12. Hack Tools Pc
  13. Tools For Hacker
  14. Pentest Tools For Ubuntu
  15. Hack Tool Apk No Root
  16. Hacking Tools 2020
  17. Hacking Tools For Kali Linux
  18. Pentest Tools Online
  19. Physical Pentest Tools
  20. Hacker Tools 2020
  21. Blackhat Hacker Tools
  22. Hack Rom Tools
  23. Pentest Tools Subdomain
  24. Hacking Tools For Windows 7
  25. Pentest Box Tools Download
  26. Hacker Tools 2019
  27. Hacker Tools Online
  28. Pentest Recon Tools
  29. Growth Hacker Tools
  30. Hacking Tools For Pc
  31. Pentest Tools Subdomain
  32. Nsa Hacker Tools
  33. Github Hacking Tools
  34. Pentest Tools Port Scanner
  35. Hacker Tools
  36. Hacker Tools Online
  37. Hacking Tools And Software
  38. Usb Pentest Tools
  39. Hacker Tools Windows
  40. Hacker Tools Online
  41. Hack Tools Pc
  42. Hacking Tools Download
  43. Hackers Toolbox
  44. Hack Tools Download
  45. Hacker Tools Free
  46. Pentest Tools Apk
  47. Pentest Tools Download
  48. Hackers Toolbox
  49. Pentest Tools Kali Linux
  50. Hacker Tools Hardware
  51. Hacker Tools For Pc
  52. Hack Tools Online
  53. Best Hacking Tools 2019
  54. Top Pentest Tools
  55. Pentest Recon Tools
  56. Hacking Tools Github
  57. Hacking Tools Mac
  58. Hack Tool Apk
  59. Hacking Tools Online
  60. Tools Used For Hacking
  61. Hack Tools 2019
  62. Hacker Tools Apk Download
  63. Hacker Tools List
  64. Pentest Tools Open Source
  65. Hacker Tools Mac
  66. Game Hacking
  67. Hacker Tools Apk
  68. Hack Tools For Pc
  69. Hacking Tools For Pc
  70. Hack Tool Apk
  71. Pentest Tools Subdomain
  72. Underground Hacker Sites
  73. Hack App
  74. Pentest Tools Website Vulnerability
  75. Hacker Tools Free
  76. Tools For Hacker
  77. Pentest Tools
  78. Hacking Tools And Software

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

Facebook Plans To Launch Its Own Cryptocurrency

The social network giant, Facebook is going through a bad phase with lots of ups and down. The recent scandal with Cambridge Analytica has caused the world's largest social network giant Facebook to change its stance on user privacy and to be more transparent about its use of the data it collects.
Since then, some social networks based in Blockchain have been popularized, namely Sphere, Steemit, and Howdoo. However, recently, something unusual announcement is announced by the social network giant Facebook itself, in which Facebook stated that it is investing in a Blockchain-based solution development team, but, the purpose of the project is not yet known.
It was with a post on the Facebook page that David Marcus confirmed his departure from the Messenger team and the creation of a small group dedicated to finding solutions based on the potential of Blockchain technology for Facebook.
David Marcus has not given much detail on the work he will do with his new group, saying only that they will study Blockchain from scratch so that they can use this revolutionary technology for Facebook.
"I'm setting up a small group to explore how to leverage Blockchain across Facebook, starting from scratch," stated David Marcus.
Despite being connected to Facebook's Messenger since 2014, David Marcus is no novice in these financial issues related to money transfers. In addition to having introduced the possibility of P2P payments in Messenger itself, David Marcus was President of PayPal and CEO of Zong, a company dedicated to payments on mobile devices.
However, his experience in this segment does not allow us to conclude that Facebook will create or support a crypto coin, but, it also doesn't mean that it will launch or support any crypto coin of its own. Blockchain technology has become famous thanks to crypto-coins, especially Bitcoin, but its potential expands dramatically to other areas.
The potential of Blockchain goes from the crypto-coins to the creation of real ecosystems online, supported by the users of the network. Sharing and storing data is a legacy that Blockchain allows you to explore and maybe the fact that Facebook will use it in your favor.
The lead post in Messenger was then handed over to Stan Chudnovsky, who now heads one of the most widely used communication services around the world, alongside WhatsApp.
Rumors also point out that James Everingham and Kevin Weil, both from Instagram, will also join David Marcus in this new onslaught of Facebook to one of today's most acclaimed technologies.

More info


  1. Easy Hack Tools
  2. Hacker Tools Free
  3. Hack Tools For Pc
  4. Pentest Reporting Tools
  5. Hacking Tools For Windows Free Download
  6. Pentest Tools Android
  7. Hacker Tools For Windows
  8. Hacker Tools Windows
  9. Pentest Tools Tcp Port Scanner
  10. Hacking Apps
  11. Hacker Tools Apk Download
  12. Hacker Tools For Mac
  13. Hak5 Tools
  14. Hacker Hardware Tools
  15. Pentest Tools Subdomain
  16. Hacker Tools List
  17. Hacking Tools For Beginners
  18. Pentest Tools List
  19. Hacker Hardware Tools
  20. Hacking Tools Usb
  21. Hacking Tools Windows
  22. Pentest Tools Android
  23. Game Hacking
  24. Hacker Tools Software
  25. Best Hacking Tools 2019
  26. Hacking Tools Software
  27. Free Pentest Tools For Windows
  28. Hacker Tools Linux
  29. Hacker Tool Kit
  30. Hackrf Tools
  31. How To Hack
  32. Hacking Tools Github
  33. Pentest Tools Subdomain
  34. Hacking Tools Mac
  35. Hacking Tools For Mac
  36. Pentest Tools Bluekeep
  37. Hack Tools For Mac
  38. Pentest Tools Download
  39. Pentest Box Tools Download
  40. How To Make Hacking Tools
  41. Hack Tools For Games
  42. Hack Website Online Tool
  43. How To Install Pentest Tools In Ubuntu
  44. Pentest Tools For Android
  45. Hacker Tools Windows
  46. Hacking Tools For Windows
  47. Top Pentest Tools
  48. Hacking Tools For Mac
  49. Hacking App
  50. Pentest Tools Android
  51. Easy Hack Tools
  52. Top Pentest Tools
  53. Best Hacking Tools 2020
  54. Hacking Tools Software
  55. What Is Hacking Tools
  56. Hack Rom Tools
  57. Hack Tools For Mac
  58. Hacking Tools For Kali Linux
  59. Free Pentest Tools For Windows
  60. Pentest Box Tools Download
  61. Hacker Tools 2019
  62. Hacking Tools Github
  63. Hack App
  64. Pentest Box Tools Download
  65. Hacks And Tools
  66. New Hacker Tools
  67. What Is Hacking Tools
  68. Hacking Tools Pc
  69. Hacking Tools For Windows 7
  70. How To Install Pentest Tools In Ubuntu
  71. What Are Hacking Tools
  72. Hack Tools Download
  73. Tools For Hacker
  74. Hacker Tools Windows
  75. Pentest Tools Download
  76. Pentest Tools Online
  77. Hackrf Tools
  78. Hacking Tools Kit
  79. New Hacker Tools
  80. Pentest Tools For Ubuntu
  81. Nsa Hack Tools
  82. Hacker Tools Github
  83. Hacker
  84. Hacking Tools For Windows
  85. Hacking Tools Download
  86. Pentest Tools Find Subdomains
  87. Hacker Tools Linux
  88. Pentest Recon Tools
  89. New Hacker Tools
  90. Install Pentest Tools Ubuntu
  91. Hacking Tools Github
  92. Hack Tools Pc
  93. Pentest Tools Open Source
  94. Hacker Tools
  95. Hack Tools For Ubuntu
  96. Hack Tools Download
  97. Hacks And Tools
  98. Nsa Hack Tools Download
  99. Pentest Tools Url Fuzzer
  100. Hack Website Online Tool
  101. Hacking Tools For Windows
  102. Hack Tools Github
  103. Best Pentesting Tools 2018
  104. How To Make Hacking Tools
  105. Hack Tools For Games
  106. Hacking Apps
  107. Hackrf Tools
  108. Pentest Tools Nmap
  109. Hack Tools For Pc
  110. Hack Tools Download
  111. Hacker
  112. Hacking Tools Kit
  113. Hacking Tools Software
  114. Kik Hack Tools
  115. Hack Tools
  116. Hacking Tools Windows 10
  117. Pentest Tools For Android
  118. Hacker Search Tools
  119. Hacking Tools Hardware
  120. Hack Tool Apk No Root
  121. Underground Hacker Sites
  122. Hack Tools For Windows
  123. Hacker Tools Hardware
  124. Top Pentest Tools
  125. Pentest Tools Find Subdomains
  126. Hacker Tools Free Download
  127. Pentest Tools List
  128. Hacker Tools Free Download
  129. Best Pentesting Tools 2018
  130. Hacking Tools Usb
  131. Hacker Tools Hardware
  132. Hacking Tools And Software
  133. Hacking Tools For Windows 7
  134. Pentest Tools Download
  135. Hacking Tools And Software
  136. Pentest Automation Tools
  137. Hack Apps
  138. Pentest Tools Subdomain
  139. Hacker Tools For Windows
  140. Hacker Tools Software
  141. Termux Hacking Tools 2019
  142. Hacking Tools Pc
  143. Hacker Tools Windows
  144. New Hacker Tools
  145. Hacker Tools For Windows
  146. Hack Tools Pc
  147. Free Pentest Tools For Windows
  148. New Hack Tools
  149. Hacking Tools And Software
  150. Hacker Tools Apk Download
  151. Hacker Tools Mac
  152. Hacker Tools Mac
  153. Hacker Security Tools
  154. Hacking Tools Kit

Quando eu te falei em amor

Quando os meus olhos te tocaram
Eu senti que encontrara
A outra, metade de mim
Tive medo de acordar
Como se vivesse um sonho
Que não pensei em realizar
E a força do desejo
Faz me chegar perto de ti

Quando eu te falei em amor
Tu sorriste para mim
E o mundo ficou bem melhor
Quando eu te falei em amor
Nos sentimos os dois
Que o amanha vem depois
E não no fim

Estas linhas que hoje escrevo
São do livro da memória
Do que eu sinto por ti
E tudo o que tu me das
É parte da história que eu ainda não vivi
E a força do desejo
Faz me chegar de ti

Quando eu te falei em amor
Tu sorriste para mim
E o mundo ficou bem melhor
Quando eu te falei em amor
Nos sentimos os dois
Que o amanha vem depois e não no fim

André Sardet

Collide

The dawn is breaking
A light shining through
You're barely waking
And I'm tangled up in you
Yeah

But I'm open, you're closed
Where I follow, you'll go
I worry I won't see your face
Light up again

Even the best fall down sometimes
Even the wrong words seem to rhyme
Out of the doubt that fills my mind
I somehow find, you and I collide

I'm quiet, you know
You make a first impression
I've found I'm scared to know
I'm always on your mind

Even the best fall down sometimes
Even the stars refuse to shine
Out of the back you fall in time
I somehow find, you and I collide

Don't stop here
I've lost my place
I'm close behind

Even the best fall down sometimes
Even the wrong words seem to rhyme
Out of the doubt that fills your mind

You finally find, you and I collide
You finally find You and I collide
You finally findYou and I collide

Howie Day


Everything

You're a falling star, You're the get away
car.

You're the line in the sand when I go too
far.

You're the swimming pool, on an August day.
And You're the perfect thing to see.

And you play it coy, but it's kinda cute.
Ah, When you smile at me you know exactly what you
do.

Baby don't pretend, that you don't know it's
true.

Cause you can see it when I look at you.

And in this crazy life, and through these crazy
times

It's you, it's you, You make me sing.
You're every line, you're every word, you're
everything.


You're a carousel, you're a wishing well,
And you light me up, when you ring my bell.
You're a mystery, you're from outer space,
You're every minute of my everyday.

And I can't believe, uh that I'm your man,
And I get to kiss you baby just because I
can.

Whatever comes our way, ah we'll see it
through,

And you know that's what our love can do.

And in this crazy life, and through these crazy
times

It's you, it's you, You make me sing
You're every line, you're every word, you're
everything.


So, La, La, La, La, La, La, La
So, La, La, La, La, La, La, La

And in this crazy life, and through these crazy
times

It's you, it's you, You make me sing.
You're every line, you're every word, you're
everything.

You're every song, and I sing along.
Cause you're my everything.
yeah, yeah

So, La, La, La, La, La, La, La
So, La, La, La, La, La, La, La

Michael Bublé