what's more interesting is how would you access memory inside of the vm from outside?
I have a old game running in vmware, there is a anticheat that knows if a)process is injected b)monitors api calls like readprocessmemory. It is sophisticated enough that I don't want to run the risk of being caught out unless the risk was very minimal.
I ran the game in vmware with the anticheat running and it is working. If I tried hacks, like a readprocessmemory or injection (from outside the VM), what ways could the anticheat still find out? It wouldn't see any api calls, but I am guessing injecting would still be out?
Thank you
what's more interesting is how would you access memory inside of the vm from outside?
Udongein (06-02-2015)
Guest physical memory is backed by host physical memory, which means the hypervisor provides a mapping from the virtualized guest to the host memory.
If you find the address you want inside the VM using Cheat Engine in the host OS, how would you get the base and offset for that address? The normal approach would just give the base and offset from the hypervisor, right?