Page 5 of 8
Re: [Discussion]Bypass for CRC and HackShield
Posted: Tue Sep 29, 2009 6:47 am
by Boredness
Slayer369 wrote:Jeof wrote:Apparently, there's one but he did not plan to sell it. He plans to use it by himself and for his friends only.
So good. But the bypass he have will get patch too right on the nxt patch?
It only depends if asiasoft have the money to update their hackshield. If they are a poor bitch, i doubt they will update.
Re: [Discussion]Bypass for CRC and HackShield
Posted: Tue Sep 29, 2009 4:35 pm
by Slayer369
Boredness wrote:Slayer369 wrote:Jeof wrote:Apparently, there's one but he did not plan to sell it. He plans to use it by himself and for his friends only.
So good. But the bypass he have will get patch too right on the nxt patch?
It only depends if asiasoft have the money to update their hackshield. If they are a poor bitch, i doubt they will update.
Asiasoft sure have money wan only they wan to use up the money of use up for themself hahah
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 8:19 am
by netboy
Is it possible we stop dlls from working rightly?
ok...if maybe we could look around about hackshield's dll v3pro32s.dll is a detection library..the dll HS use to to detect hacks like memory editng, writeprocessmemory, openprocess, readprocessmemory...its also the main dll HS is using...
V3WARPNS.V3D AND V3WARPDS.V3D,their are dlls that encrypted text files that contain the information about each hack detected by hackshield.. their HS hacklist....
im not so sure about the rest of the other dlls .....
I think its possible for us to stop it from running its library so that it will not detect CE/UCE...
as u know that HS gives a driver check everytime u start maple......i know theres some1 who make that driver check bypass...but he just wanna sell it for SGD....
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 8:35 am
by Boredness
netboy wrote:Is it possible we stop dlls from working rightly?
ok...if maybe we could look around about hackshield's dll v3pro32s.dll is a detection library..the dll HS use to to detect hacks like memory editng, writeprocessmemory, openprocess, readprocessmemory...its also the main dll HS is using...
V3WARPNS.V3D AND V3WARPDS.V3D,their are dlls that encrypted text files that contain the information about each hack detected by hackshield.. their HS hacklist....
im not so sure about the rest of the other dlls .....
I think its possible for us to stop it from running its library so that it will not detect CE/UCE...
as u know that HS gives a driver check everytime u start maple......i know theres some1 who make that driver check bypass...but he just wanna sell it for SGD....
EagleNT method disable the driver same as it. But does not disable crc check.
Either code another CRC bypass through asm method. Anyway do you know where is the range of CRC check?
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 8:44 am
by netboy
Nope... the lastest crc bypass asm code has been patched rite? to be honest i just started to hack maple last week lol....coz i found maple comes with a powerful anti cheat system....wanna increase my knowledge of bypassing many anti hack systems...=X ...so now we are unable to get pointers for some hacks coz HS detects any debugger process...i heard theres a dll that will block HS's dll library from loading...too bad im not good in compiling 1 = =
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 8:57 am
by Boredness
netboy wrote:Nope... the lastest crc bypass asm code has been patched rite? to be honest i just started to hack maple last week lol....coz i found maple comes with a powerful anti cheat system....wanna increase my knowledge of bypassing many anti hack systems...=X ...so now we are unable to get pointers for some hacks coz HS detects any debugger process...i heard theres a dll that will block HS's dll library from loading...too bad im not good in compiling 1 = =
The CRC Bypass that was used last time is for gameguard and not for Hackshield, thus leading us not able to use it to bypass CRC check. We are still able to get pointers, but i'm using vista. Some pointer cannot be found but my XP friend are able to find it. I think is due to OS problem. HS's dll from loading? you mean driver. That's the EagleNT method incase if you dunno
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 9:14 am
by netboy
ya EagleNT is another method....but its soon will be patched though..the 1 i ment is... something that prevent v3pro32s.dll from loading with HS or maybe yes loaded toghter with HS but is functionless like a fake dll example..... i try dll editing but its useless..even a single code is gone, its consider all damaged...
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 10:11 am
by Boredness
netboy wrote:ya EagleNT is another method....but its soon will be patched though..the 1 i ment is... something that prevent v3pro32s.dll from loading with HS or maybe yes loaded toghter with HS but is functionless like a fake dll example..... i try dll editing but its useless..even a single code is gone, its consider all damaged...
EagleNT method just prevent HS from loading...i dunno how they patch it. If they wanna patch it, why add in CRC check? lols...With CRC check, even we disable that crap. It is also useless. Loading a fake dll? Why not hex edit the original dll and nop the functions
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 10:24 am
by netboy
Apparently its isnt easy to hex edit 1 also.....its gona be more difficult after HSK-UL has been patched...gona have to work on for HS and CRC bypass...
Re: [Discussion]Bypass for CRC and HackShield
Posted: Wed Sep 30, 2009 10:30 am
by Boredness
netboy wrote:Apparently its isnt easy to hex edit 1 also.....its gona be more difficult after HSK-UL has been patched...gona have to work on for HS and CRC bypass...
lols, there's a glitch in HackShield and HSK-UL.dll make use of it. The glitch is fixed in GMS. lols, does Packet Edit need CRC Bypass? I doubt not. Want to complete he project already
