I have been looking for this answer for a while now, I know that in some hack shields, they basicly make an application run to replace pb, and give fake outputs. May someone explain to me how the bypassing of pb works....Its just i'm so board I wan't somthing more fun then just writing process memory.
Last edited by radnomguywfq3; 10-27-2007 at 07:13 PM.
There are two types of tragedies in life. One is not getting what you want, the other is getting it.
If you wake up at a different time in a different place, could you wake up as a different person?
i think it is smink like a security program (like AVG, zonealarm, ect) that basicaly denys pb permission to scan your HDD. Not sure though!
to bypass pb i think you can emulate it but going through by debugging it and looking for the PB scan code and either Jmp it or loop it i think you can bypass PB but you then have to compile it in either ASM or using a ASM module in VB
is there any way of monitoring what a application does? i.e. see what outputs it realy makes?
Look in Pbcl.dll,if you know ASM you know what to do...if not than learn ASM...
you could use a UCE and use mem browser and then find all the things that send out the data to ban you and NOP them?
Ugh, yea actually you do. If your Reverse Engineer the application then there is some NOPing involved. NOP = No Operations.
There are two types of tragedies in life. One is not getting what you want, the other is getting it.
If you wake up at a different time in a different place, could you wake up as a different person?
How a bypass works? What does it make to PB?
I'm Alen on Steam. RIP Skype Friday nights.
I'm Navi's lover 💖
Dave84311: God I've always wanted to eat crayons, with their vibrant colors. Only if they had taste.
Mr. Lonely: @Alen I like making you wet, it makes me hard.