You are thinking about this all wrong, this is a trust issue not truly a cracking issue. Consider the facts:
Our goal is to modify or introduce data that is sent to the server in such a way as to give ourselves something, in order to prevent this gaijin has encrypted net traffic between their servers and your computer, however the vulnerability is introduced at the terminus. In this case the terminus is our computer, in order for our computer to process or understand the information received from the server or that it will send to the server the data is at some point in an unencrypted state, likely in ram. Our goal, therefore ought to be modification of the data before its encryption either through userspace WPM or kernel level execution (ala blackbone ala xenos).
Pardon spelling errors typed on tiny phone