Thread: Bypassing PB

Page 1 of 2 12 LastLast
Results 1 to 15 of 28
  1. #1
    radnomguywfq3's Avatar
    Join Date
    Jan 2007
    Gender
    male
    Location
    J:\E\T\A\M\A\Y.exe
    Posts
    8,858
    Reputation
    381
    Thanks
    1,823
    My Mood
    Sad

    Bypassing PB

    I have been looking for this answer for a while now, I know that in some hack shields, they basicly make an application run to replace pb, and give fake outputs. May someone explain to me how the bypassing of pb works....Its just i'm so board I wan't somthing more fun then just writing process memory.
    Last edited by radnomguywfq3; 10-27-2007 at 07:13 PM.



    There are two types of tragedies in life. One is not getting what you want, the other is getting it.

    If you wake up at a different time in a different place, could you wake up as a different person?


  2. The Following 6 Users Say Thank You to radnomguywfq3 For This Useful Post:

    chubkakes (02-22-2008),K2 Nemico (12-26-2007),lemons44 (01-27-2008),murthedragon07 (06-18-2008),MZKING (11-12-2007),wordy (01-06-2008)

  3. #2
    olie122333's Avatar
    Join Date
    Oct 2007
    Gender
    male
    Posts
    438
    Reputation
    10
    Thanks
    20

    dunno

    i think it is smink like a security program (like AVG, zonealarm, ect) that basicaly denys pb permission to scan your HDD. Not sure though!

  4. #3
    condor01's Avatar
    Join Date
    Feb 2007
    Location
    In My Bed
    Posts
    765
    Reputation
    17
    Thanks
    91
    to bypass pb i think you can emulate it but going through by debugging it and looking for the PB scan code and either Jmp it or loop it i think you can bypass PB but you then have to compile it in either ASM or using a ASM module in VB

  5. #4
    olie122333's Avatar
    Join Date
    Oct 2007
    Gender
    male
    Posts
    438
    Reputation
    10
    Thanks
    20
    is there any way of monitoring what a application does? i.e. see what outputs it realy makes?

  6. #5
    LegendaryHacker1337's Avatar
    Join Date
    Oct 2007
    Posts
    56
    Reputation
    11
    Thanks
    117
    attach the process with a debugger.

  7. #6
    masterboy120's Avatar
    Join Date
    Jul 2007
    Gender
    male
    Location
    The Netherlands
    Posts
    371
    Reputation
    10
    Thanks
    34
    My Mood
    Amazed
    Look in Pbcl.dll,if you know ASM you know what to do...if not than learn ASM...

  8. #7
    frono15's Avatar
    Join Date
    Sep 2007
    Location
    right behind u
    Posts
    108
    Reputation
    10
    Thanks
    3
    can sum1 post a vid?

  9. #8
    AlexSleyore's Avatar
    Join Date
    Sep 2007
    Posts
    44
    Reputation
    10
    Thanks
    11
    you could use a UCE and use mem browser and then find all the things that send out the data to ban you and NOP them?

  10. #9
    vescovo's Avatar
    Join Date
    Sep 2007
    Location
    Hitlers Grave
    Posts
    1,403
    Reputation
    11
    Thanks
    145
    a bad isnt an addie

  11. #10
    AlexSleyore's Avatar
    Join Date
    Sep 2007
    Posts
    44
    Reputation
    10
    Thanks
    11
    Quote Originally Posted by vescovo View Post
    a bad isnt an addie

    yes it is.. if you NOP the punkbuter addys that tell it to ban you your dealing with addys.. same way OPK and anti-kick work

  12. #11
    urbanlime's Avatar
    Join Date
    Sep 2007
    Posts
    1
    Reputation
    10
    Thanks
    0
    you dont nop the addresses...

  13. #12
    radnomguywfq3's Avatar
    Join Date
    Jan 2007
    Gender
    male
    Location
    J:\E\T\A\M\A\Y.exe
    Posts
    8,858
    Reputation
    381
    Thanks
    1,823
    My Mood
    Sad
    Ugh, yea actually you do. If your Reverse Engineer the application then there is some NOPing involved. NOP = No Operations.



    There are two types of tragedies in life. One is not getting what you want, the other is getting it.

    If you wake up at a different time in a different place, could you wake up as a different person?


  14. #13
    ivopereira's Avatar
    Join Date
    Jan 2008
    Posts
    20
    Reputation
    10
    Thanks
    2
    How a bypass works? What does it make to PB?

  15. #14
    Alen's Avatar
    Join Date
    Oct 2007
    Gender
    male
    Location
    Liquid Generator
    Posts
    27,920
    Reputation
    2548
    Thanks
    4,224
    My Mood
    Fine
    Quote Originally Posted by ivopereira View Post
    How a bypass works? What does it make to PB?
    Check the dates and bring up old topics (this is a month old)

  16. #15
    ivopereira's Avatar
    Join Date
    Jan 2008
    Posts
    20
    Reputation
    10
    Thanks
    2
    Quote Originally Posted by mastasnip3 View Post
    Check the dates and bring up old topics (this is a month old)
    oops, sorry friend.
    but do you know the answer? lol

Page 1 of 2 12 LastLast

Similar Threads

  1. Gunz Bypass
    By Paolo1993 in forum Gunz Hacks
    Replies: 52
    Last Post: 04-18-2009, 04:47 AM
  2. Warrock Game Guard Bypass
    By Dave84311 in forum WarRock - International Hacks
    Replies: 206
    Last Post: 02-21-2006, 06:30 PM
  3. Bypassing School Filters
    By Mortifix in forum Game Hacking Tutorials
    Replies: 1
    Last Post: 01-11-2006, 12:01 PM
  4. Replies: 0
    Last Post: 01-04-2006, 05:45 AM
  5. Gunbound CE bypass
    By Brunogol in forum General Game Hacking
    Replies: 0
    Last Post: 12-30-2005, 10:00 AM