Results 1 to 3 of 3
  1. #1
    pc117's Avatar
    Join Date
    Dec 2011
    Gender
    male
    Location
    Malaysia,Kuala Lumpur
    Posts
    222
    Reputation
    10
    Thanks
    1,853
    My Mood
    Sick

    Bypassing Apex: Process Reboot ( Old )

    Bypassing Apex: Process Reboot
    Other than this initial reboot, the anti-cheat is very poor, you can rewrite the whole .text section and then take a shit inside it's process space and it wont notice.
    Module which handles the rebooting: 'BootThunker.xoe'.
    This section is not packed at runtime so you can analyse the code without needing view the virtual memory at runtime.
    Long story short, you want to stop it calling BootThunkerStart.
    I've hacked 3 different games with this anti-cheat and this has been the same for all of them. You have a modified entry-point which loads up a start routine.
    The start routine calls will look like this:


    sub_11E0A40(&dword_11F6D14);
    v5 = (int)sub_11DE550(v3, v4, a1, 0);
    *(_DWORD *)(v5 + 16) = ((int (__cdecl *)())*(&sub_11F5060 + 1))();
    sub_11E1DD0(0);
    if ( sub_11DE640(0) )
    {
    sub_11E0A40(&dword_11F6D18);
    v6 = sub_11DFC70(0, v5);
    v15 = v6;
    if ( v6 )
    {
    sub_11E0A40(dword_11F6D1C);
    v13 = v6;
    v12 = 1;
    }
    else
    {
    sub_11E0A40(&dword_11F6D28);
    v7 = sub_11E0020(0, 0);
    v15 = v7;
    if ( v7 )
    {
    sub_11E0A40(dword_11F6D2C);
    v13 = v7;
    v12 = 2;
    }
    else
    {
    sub_11E0A40(&dword_11F6D38);
    v8 = sub_11DFDA0(0, 0);
    v15 = v8;
    if ( !v8 )
    goto LABEL_12;
    sub_11E0A40(dword_11F6CF8);
    v13 = v8;
    v12 = 3;
    }
    }

    11E0A40 being a logging function, followed by a function call. The functions called are just wrappers for avital's modules. The rest of the code in these functions I can assume is just error handling. However there seem to be no self-preservation checks present.
    The target 'wrapper function' you want will look something like this:


    v6 = (int (*)(void))sub_11F502C("BootThunkerStart");

    Solutions:
    Hook the wrapper function.
    Hook the import.
    Hook something else.
    Stop the function from happening.
    Long story short, you can replace the call to the wrapper function with 'nop' operations.
    example:

    .axL:011DE17D call sub_11E0020
    5 Byte NOP here would suffice.
    Remember not to disregard the fact that it will no longer give you a EAX.

    EAX = sub_11E0020(0, 0);
    So it will be using the other EAX, which happens to be fine.
    Last edited by pc117; 06-24-2016 at 06:18 AM.

  2. The Following User Says Thank You to pc117 For This Useful Post:

    BoboBird9 (08-03-2016)

  3. #2
    astron51's Avatar
    Join Date
    Oct 2011
    Gender
    male
    Location
    Stuttgart, Germany
    Posts
    618
    Reputation
    57
    Thanks
    4,939
    My Mood
    Dead
    Quote Originally Posted by pc117 View Post
    Bypassing Apex: Process Reboot
    Other than this initial reboot, the anti-cheat is very poor, you can rewrite the whole .text section and then take a shit inside it's process space and it wont notice.
    Module which handles the rebooting: 'BootThunker.xoe'.
    This section is not packed at runtime so you can analyse the code without needing view the virtual memory at runtime.
    Long story short, you want to stop it calling BootThunkerStart.
    I've hacked 3 different games with this anti-cheat and this has been the same for all of them. You have a modified entry-point which loads up a start routine.
    The start routine calls will look like this:


    sub_11E0A40(&dword_11F6D14);
    v5 = (int)sub_11DE550(v3, v4, a1, 0);
    *(_DWORD *)(v5 + 16) = ((int (__cdecl *)())*(&sub_11F5060 + 1))();
    sub_11E1DD0(0);
    if ( sub_11DE640(0) )
    {
    sub_11E0A40(&dword_11F6D18);
    v6 = sub_11DFC70(0, v5);
    v15 = v6;
    if ( v6 )
    {
    sub_11E0A40(dword_11F6D1C);
    v13 = v6;
    v12 = 1;
    }
    else
    {
    sub_11E0A40(&dword_11F6D28);
    v7 = sub_11E0020(0, 0);
    v15 = v7;
    if ( v7 )
    {
    sub_11E0A40(dword_11F6D2C);
    v13 = v7;
    v12 = 2;
    }
    else
    {
    sub_11E0A40(&dword_11F6D38);
    v8 = sub_11DFDA0(0, 0);
    v15 = v8;
    if ( !v8 )
    goto LABEL_12;
    sub_11E0A40(dword_11F6CF8);
    v13 = v8;
    v12 = 3;
    }
    }

    11E0A40 being a logging function, followed by a function call. The functions called are just wrappers for avital's modules. The rest of the code in these functions I can assume is just error handling. However there seem to be no self-preservation checks present.
    The target 'wrapper function' you want will look something like this:


    v6 = (int (*)(void))sub_11F502C("BootThunkerStart");

    Solutions:
    Hook the wrapper function.
    Hook the import.
    Hook something else.
    Stop the function from happening.
    Long story short, you can replace the call to the wrapper function with 'nop' operations.
    example:

    .axL:011DE17D call sub_11E0020
    5 Byte NOP here would suffice.
    Remember not to disregard the fact that it will no longer give you a EAX.

    EAX = sub_11E0020(0, 0);
    So it will be using the other EAX, which happens to be fine.
    Saw this long time ago... You leech it from U*nkn*nC***t
    /msg2short
    Last edited by astron51; 06-24-2016 at 08:18 PM.

    Quote Originally Posted by Aula View Post
    FaQ2: Will my Main account will get ban?
    -Hell yeah . Who ask u to use this 3rd party program on ur main account ? Fcking Idiot .

    Get 100 Thanks - ✔
    Get 200 Thanks - ✔
    Get 300 Thanks - ✔
    Get 400 Thanks - ✔
    Get 500 Thanks - ✔
    Get 600 Thanks - ✔
    Get 700 Thanks - ✔
    Get 800 Thanks - ✔
    Get 900 Thanks - ✔
    Get 1000 Thanks - ✔
    Get 1500 Thanks - ✔
    Get 2000 Thanks - ✔
    Get 2500 Thanks - ✔
    Achievement Completed.

  4. #3
    haqkhan's Avatar
    Join Date
    Feb 2014
    Gender
    male
    Posts
    4
    Reputation
    10
    Thanks
    0
    hi. I was muslim .. I pray to for urself.how to use mack video and shere my eng is poor i need help plssssssss

Similar Threads

  1. [Discussion] REZ Hacking/Editing is achievable without bypassing authentication processes
    By grimreaperre in forum CrossFire Mods & Rez Modding
    Replies: 14
    Last Post: 03-19-2016, 05:46 PM
  2. How to use bypass "code" to get old hacks.
    By pwnagebeef in forum Combat Arms Help
    Replies: 4
    Last Post: 04-05-2010, 05:56 PM
  3. [Release] Bypass, can get old hacks working again
    By Mr Moggy in forum Combat Arms Hacks & Cheats
    Replies: 228
    Last Post: 10-10-2009, 01:29 PM
  4. How to bypass without bypasser or terminating process.
    By deFskull in forum Blackshot Hacks & Cheats
    Replies: 2
    Last Post: 09-08-2009, 11:47 PM
  5. the detected thing in a bypass is the process name!!!!
    By prox32 in forum WarRock - International Hacks
    Replies: 23
    Last Post: 07-21-2007, 08:09 PM