Cheat Engine Forum Index Cheat Engine
The Official Site of Cheat Engine
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 


ntoskrnl.exe patch detected

 
Post new topic   Reply to topic    Cheat Engine Forum Index -> General Gamehacking
View previous topic :: View next topic  
Author Message
linden
Master Cheater
Reputation: 0

Joined: 10 Mar 2006
Posts: 319

PostPosted: Sat Oct 07, 2006 12:13 am    Post subject: ntoskrnl.exe patch detected Reply with quote

I did the following things in attempt to hide all the patches I've made to ntoskrnl.exe's memory image...
1. created a dummy file of ntoskrnl.exe containing all the patches I've done to its memory image. (with all the relocs fixed, so if it is mapped to the same address as kernel base, it will look exactly like the patched kernel memory image)
2. fixed checksum field of the dummy file.
3. fixed checksum of ntoskrnl.exe's memory image to match that of the dummy file
4. hooked NtCreateFile, so if GG or any enemy process trys to open ntoskrnl.exe, I swap the file name so it reads my dummy file instead of the original. (this hook is also reflected in the dummy file)

I was able to successfully fool SVV (System Virginity Verifier by Joanna Rutkowska). But GG complains that my ntoskrnl.exe (the dummy file) file is not correct...(but the game still runs though...)

Anybody with any idea about what it's detecting Question or looking for Question
I think I've made everything to look consistent, how does it know that my file is incorrect...

Ntoskrnl.exe gets patched from time to time by windows update... so I don't suppose they'll keep a white list of checksums to compair against... Sad

BTW, I also tried hooking MJ_READ in FSD... but GG seem to use memory mapped file for reading, now having hard time messing with PAGING_IO Crying or Very sad
Back to top
View user's profile Send private message
Dark Byte
Site Admin
Reputation: 471

Joined: 09 May 2003
Posts: 25833
Location: The netherlands

PostPosted: Sat Oct 07, 2006 4:25 am    Post subject: Reply with quote

it could be nprotect keeps a list of the first few bytes of some functions for every version of windows they know.
Also, windows updates usually don't edit the kernel too much (since then the symbolfiles would need to be updated, and they still work), and if they do, they only change the first 2 bytes with a shortjump to the nops in front that in turn jump to the new code (hotpatching)

_________________
Do not ask me about online cheats. I don't know any and wont help finding them.

Like my help? Join me on Patreon so i can keep helping
Back to top
View user's profile Send private message MSN Messenger
linden
Master Cheater
Reputation: 0

Joined: 10 Mar 2006
Posts: 319

PostPosted: Sun Oct 08, 2006 9:34 am    Post subject: Reply with quote

Oh, fuck...
If they really keep a list of first few bytes from some functions, it'd be really a pain in the ass to bypass Sad

Maybe I must try memory cloaking and page fault handler hooking...

Anyway, think I should do more research on what they are looking for...
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    Cheat Engine Forum Index -> General Gamehacking All times are GMT - 6 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group

CE Wiki   IRC (#CEF)   Twitter
Third party websites