Results 1 to 8 of 8
  1. #1
    Yepikiyay's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Posts
    320
    Reputation
    10
    Thanks
    37
    My Mood
    Drunk

    [INFO]Hack Shield Analysis

    Hack Shield Analysis

    Credits: Me. Please don't use this without my permission.



    Hi there, and welcome to my information dump on Hack Shield, one of the best Anti-Cheat out right now(HAHAH jokes). Today you will essentially learn what Hack Shield is made of, how Hack Shield works, and you will even learn some new bypassing ideas.

    Index
    1. Hack Shield Components
    2. Hack Shield Flow
    3. Bypassing Theory


    1. Hack Shield Components

    Hack Shield consists of:

    1. EhSvc.dll
      • EhSvc is the Hack Shield interface dll
      • It communicates between the game client and Hack Shield
      • It communicates with the Hack Shield driver (EagleNT.sys)
      • It initiates the hack tool detection engine
      • This is usually the only file needed to create a workable bypass
    2. V3Pro32s.dll
      • This is the hacking tool detection interface dll
      • This starts the hacking tool detection engine
      • This is helps the scanning of known hack signatures
      • A very important file. This could interrupt the Hack Shield driver if correctly intercepted
    Code:
    _AhnGetFileEntry    0x1000bb9c    0x0000bb9c    30 (0x1e)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnBootInformation    0x1000b16f    0x0000b16f    1 (0x1)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnCheckBootSector    0x1000b177    0x0000b177    2 (0x2)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnCheckDefaultExtensions    0x1000124a    0x0000124a    3 (0x3)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnCheckFile    0x1000ba5e    0x0000ba5e    4 (0x4)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnCheckMemory    0x1000b160    0x0000b160    5 (0x5)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnCheckProcess    0x1000b79d    0x0000b79d    6 (0x6)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetBootRepairStatus    0x1000b5b9    0x0000b5b9    7 (0x7)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetDefaultExtensions    0x1000126b    0x0000126b    8 (0x8)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetEngineDate    0x100013fd    0x000013fd    9 (0x9)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetEngineDateString    0x1000145c    0x0000145c    10 (0xa)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetEngineDateValue    0x10001449    0x00001449    11 (0xb)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetExtRepairStatus    0x1000b287    0x0000b287    12 (0xc)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetRepairStatus    0x1000b1b4    0x0000b1b4    13 (0xd)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetVersion    0x100014f7    0x000014f7    14 (0xe)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetVirusFileCureData    0x1000120b    0x0000120b    15 (0xf)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetVirusName    0x100010d1    0x000010d1    16 (0x10)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetVirusName32    0x1000108c    0x0000108c    17 (0x11)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetVirusNameStr    0x1000116c    0x0000116c    18 (0x12)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnGetVirusNameStr32    0x100010ab    0x000010ab    19 (0x13)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnInitVaccineEngine    0x1000b600    0x0000b600    20 (0x14)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnRepairBootSector    0x1000b17e    0x0000b17e    21 (0x15)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnRepairFile    0x1000eea0    0x0000eea0    22 (0x16)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnRepairMemory    0x1000b167    0x0000b167    23 (0x17)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnSetDefaultOption    0x1000ba89    0x0000ba89    24 (0x18)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    AhnSetExtensions    0x10001295    0x00001295    25 (0x19)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    PV3CALGetInfoAddr    0x1000a0fe    0x0000a0fe    26 (0x1a)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    V3CALGetInfo    0x1000a0c2    0x0000a0c2    27 (0x1b)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    V3CALGetShowInfo    0x1000a080    0x0000a080    28 (0x1c)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll    
    V3CALGetTotalInfoCount    0x1000a0b9    0x0000a0b9    29 (0x1d)    v3pro32s.dll    C:\Nexon\Combat Arms\HShield\v3pro32s.dll
    3N.mhe


    The Heuristic engine file
    Contains the patterns used to search for known hacks

    psapi.dll

    The process status helper dll
    Helps scan process signatures and control process functions
    Code:
    EmptyWorkingSet    0x76a61e20    0x00001e20    1 (0x1)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    EnumDeviceDrivers    0x76a615a3    0x000015a3    2 (0x2)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    EnumPageFilesA    0x76a63b3c    0x00003b3c    3 (0x3)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    EnumPageFilesW    0x76a639cd    0x000039cd    4 (0x4)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    EnumProcesses    0x76a634a9    0x000034a9    6 (0x6)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    EnumProcessModules    0x76a61a8a    0x00001a8a    5 (0x5)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetDeviceDriverBaseNameA    0x76a61748    0x00001748    7 (0x7)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetDeviceDriverBaseNameW    0x76a61823    0x00001823    8 (0x8)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetDeviceDriverFileNameA    0x76a616cd    0x000016cd    9 (0x9)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetDeviceDriverFileNameW    0x76a617c7    0x000017c7    10 (0xa)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetMappedFileNameA    0x76a61945    0x00001945    11 (0xb)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetMappedFileNameW    0x76a6187f    0x0000187f    12 (0xc)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetModuleBaseNameA    0x76a61d2f    0x00001d2f    13 (0xd)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetModuleBaseNameW    0x76a61cb2    0x00001cb2    14 (0xe)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetModuleFileNameExA    0x76a61c4a    0x00001c4a    15 (0xf)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetModuleFileNameExW    0x76a61bcd    0x00001bcd    16 (0x10)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetModuleInformation    0x76a61d97    0x00001d97    17 (0x11)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetPerformanceInfo    0x76a6382d    0x0000382d    18 (0x12)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetProcessImageFileNameA    0x76a637a9    0x000037a9    19 (0x13)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetProcessImageFileNameW    0x76a6371b    0x0000371b    20 (0x14)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetProcessMemoryInfo    0x76a635c2    0x000035c2    21 (0x15)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    GetWsChanges    0x76a636e1    0x000036e1    22 (0x16)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    InitializeProcessForWsWatch    0x76a6369d    0x0000369d    23 (0x17)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    QueryWorkingSet    0x76a61e8b    0x00001e8b    24 (0x18)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll    
    QueryWorkingSetEx    0x76a61ec7    0x00001ec7    25 (0x19)    psapi.dll    C:\Nexon\Combat Arms\HShield\psapi.dll
    1. V3Warp(d)(n)s.v3d
    2. The anti-hacking engine pattern file

    • Not to sure exactly what this does, but it reads the 3N.mhe file
    EagleNT.sys

    The Hack Shield kernel driver
    • Performs anti-hacking functions, protects the game client's process, and hooks certain API's, rendering them useless
    • If successfully uninitiated, it could enable the use of many API's and functions such as Read/WriteProcessMemory.

    2. Hack Shield Flow

    Here is a graphical chart explaining how all the components work together:
    [IMG]https://i254.photobucke*****m/albums/hh113/McElf223/structure.jpg[/IMG]
    Here is a graphical chart explaining how Hack Shield is started:
    [IMG]https://i254.photobucke*****m/albums/hh113/McElf223/hs_pc.jpg[/IMG]
    **If I were you I would pay attention to those function names!

    3. Bypassing Theory

    So, we got some nice information about Hack Shield. How do we bypass it? I will tell you right now, I'm going to show you some very unconventional and new ideas. Say goodbye to your petty API and ASM bypasses, and say hello to your new best friend: detouring. Before we continue, you should have a strong foundation in detouring. If you don't, I recommend watching this: Created by Camtasia Studio 5


    So what functions do we detour? In reality, you are going to be detouring CallBack. The CallBack function in Hack Shield collects data from the Hack Shield service. The data is usually errors or "Hack Detected" type messages. The goal of course is to stop it from getting the Hack Detected messages, or stop it from alerting the game client that there is a "Hack Detected" message. The first goal is to find the actual name of the function. The next step is to rebuild the params of the function. The next step is to find the address of this function. Then finally you detour it. Here is my example (not working probably):
    Code:
    ////// Declares //////
    #define CallBackAddy 0x0000001
    typedef int ( *PFN_AhnEH_Callback)( long lCode, long lParamSize, void* pParam ); //the name of the function actually is PFN_AhnEH_Callback
    PFN_AhnEH_Callback pAhnEH_Callback; //Defining our function
    //////
    
    ////// Our new function //////
    int _CallBackThread()
    {
        DWORD dwCode = YOUR_CODE_TO_PASS;
        int myReturn = pAhnEH_Callback(dwCode, 0, NULL);
        return myReturn;
    }
    //////
    ////// Our Detour //////
    pAhnEH_Callback  = (PFN_AhnEH_Callback)DetourFunction( (PBYTE)( Ehsvc + CallBackAddy ), (PBYTE)_CallBackThread()); 
    //////
    OLD SCHOOL BYPASS CODE XD

    This is just pseudo code, but hopefully you get the idea. The hard part is finding the address of the function. There are some function addresses included for Combat Arms, but that's just Combat Arms. I have my way of getting it, but I'm leaving it up to you to figure out how to get the address. I don't want to completely hand feed you a working bypass. There are a couple ways to get it.

    As a conclusion, I just want to say that you need to use your imagination! Find different functions. Find different ways to bypass. Rip Hack Shield apart.
    Last edited by Yepikiyay; 08-04-2010 at 02:30 AM. Reason: ADDED INFO PREFIX

    I Hate You
    Current Status: Online Playing MineCraft

  2. The Following User Says Thank You to Yepikiyay For This Useful Post:

    Exetra (08-16-2012)

  3. #2
    xbeatsszzx's Avatar
    Join Date
    Feb 2010
    Gender
    male
    Location
    Behind a dumpster jerking off. xD jks
    Posts
    2,519
    Reputation
    13
    Thanks
    1,508
    My Mood
    Asleep
    ok...lol i dont get the codes
    I Am on this site for the mods for mw2 ONLY. Not hacks.

  4. The Following User Says Thank You to xbeatsszzx For This Useful Post:

    imgayftw (09-03-2010)

  5. #3
    candrajack's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Posts
    6
    Reputation
    10
    Thanks
    0
    nice....info ..... OH yeah

  6. #4
    Illuminatus's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Location
    New Zealand
    Posts
    1,497
    Reputation
    2
    Thanks
    46
    My Mood
    Tired
    For the two people above me, I somehow doubt this is for script kids like me and you.




    Press The Thanks Button If I Helped =D
    Quote Originally Posted by mamakiller13 View Post

    and im aint fag,
    FORMERLY KNOWN AS SloaMoeDaea

  7. #5
    diaz86's Avatar
    Join Date
    Aug 2010
    Gender
    male
    Location
    indonesia
    Posts
    14
    Reputation
    10
    Thanks
    3
    My Mood
    Buzzed
    TELL HOW TO BYPASS HACKSHIELD ON POINT BLANK PLIZZZ

  8. #6
    koolguyy's Avatar
    Join Date
    Sep 2010
    Gender
    male
    Location
    Candyland
    Posts
    1,381
    Reputation
    81
    Thanks
    170
    Lol...good luck you noobs trying to get a bypass..i got one already..They are hard to find these days..gotta make them yourself GOOD LUCK NUMBS

  9. #7
    D3Dh0oker's Avatar
    Join Date
    Jan 2010
    Gender
    male
    Location
    Snow vally
    Posts
    1,850
    Reputation
    8
    Thanks
    438
    My Mood
    Angelic
    EhSvc.dll
    EhSvc is the Hack Shield interface dll
    It communicates between the game client and Hack Shield
    It communicates with the Hack Shield driver (EagleNT.sys)
    It initiates the hack tool detection engine
    This is usually the only file needed to create a workable bypass

    --------------
    not rlly true, using stuff i got rid of Jump_short the main bypass component ._. and there on it was a bypass but that got patched and 2 lazy to update

  10. #8
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,033
    Reputation
    340
    Thanks
    2,792
    My Mood
    Sad
    Quote Originally Posted by D3Dh0oker View Post
    EhSvc.dll
    EhSvc is the Hack Shield interface dll
    It communicates between the game client and Hack Shield
    It communicates with the Hack Shield driver (EagleNT.sys)
    It initiates the hack tool detection engine
    This is usually the only file needed to create a workable bypass

    --------------
    not rlly true, using stuff i got rid of Jump_short the main bypass component ._. and there on it was a bypass but that got patched and 2 lazy to update
    or you could do the same to the HackShield driver. The driver is the thing that does most of the checking.

Similar Threads

  1. Can someone send me a hack shield bypass that works?
    By fishout in forum Combat Arms Hacks & Cheats
    Replies: 1
    Last Post: 04-15-2009, 04:04 PM
  2. The Fuck. Ing. Hack. Shield!
    By StarloricVMC in forum Combat Arms Hacks & Cheats
    Replies: 11
    Last Post: 01-12-2009, 05:03 PM
  3. Hack shield bypass for all nubs
    By Jazz in forum Combat Arms Hacks & Cheats
    Replies: 15
    Last Post: 08-22-2008, 11:05 AM
  4. Hack Shield Pro Addies
    By zth142 in forum Combat Arms Hacks & Cheats
    Replies: 5
    Last Post: 08-02-2008, 11:15 PM
  5. hack shield bypass...
    By viper131 in forum Combat Arms Hacks & Cheats
    Replies: 1
    Last Post: 08-02-2008, 10:35 PM