Bumpity. //2short
Bumpity. //2short
If you have any questions regarding my hacks, add me on Discord: Merccy#8314
Do you know if VAC is able to detect segments of code that may remains consistent between versions of hacks or even different hacks by the same hack developer? Suppose you use the exact same method/function in every hack you make to configure and register a transparent window overlay and initialize a Direc3D device. Can VAC see common code segments in the running executables and flag users for bans?
Would doing any of the below obfuscate the detection process?
a) Changing the order of structures/data methods in source files.
b) Adding random garbage elements data/structures methods/calls to source files while retaining overall program logic.
c) Doing ASM dumps of code and inserting random garbage noops or equivalent (mov edi,edi; add eax,0; etc.) throughout the code.
Or am I over thinking the potential efficacy of VAC?
Last edited by Spifficus; 02-17-2015 at 11:39 PM.
If you have any questions regarding my hacks, add me on Discord: Merccy#8314
So how does VAC detect hacks that are used under VMProtect?
so is it possible to bypass the security ?
Alot of good information! Thanks
Wow man! great infos. Your the man.
Although, to clarify VAC basically scans those blocks, and if it sees a red block which means a program is used, it bans the account. right? im kinda unclear about the signature and red blocks.
So much information *.* Just a few questions though, Merccy.
Using VMProtect on a hack will change it's signature such that only VMProtect can read it right?
So, assuming a hack has been detected by VAC.. VAC uses the signature scanning to check on hacks, so if I were to use VMProtect on a detected hack, will that prevent VAC from detecting it?
Thanks!
Last edited by emberofafire; 05-21-2015 at 12:56 AM. Reason: op grammar