Sorry for my stupid question guys, if it was mentioned somewhere.
Can warden detect memory read? Is it possible only to detect memory write?
So, basically: Are using memory reading and window's SendInput fully safe for a bot?
Sorry for my stupid question guys, if it was mentioned somewhere.
Can warden detect memory read? Is it possible only to detect memory write?
So, basically: Are using memory reading and window's SendInput fully safe for a bot?
it could. but in it's current form does not.
Keyboard messages sent vie SendInput have an 'injected' flag set. WoW could easily check for that, but could never use it as a ban reason.
Maybe I'm clueless but I spent a half hour googling everything I could think of and I never found anything about detecting memory reads between processes. I realize that kernel code could probably do it quite easily but my understanding was that WoW didn't run any kernel code. Maybe you can clue me in? I'm more than just a little curious about how to do this in user space.
actually you know what, I ran out of spoons. Here is a book![]()
http://technet.microsoft.com/en-us/s...rnals/bb963901
Last edited by sitnspinlock; 02-20-2012 at 01:40 AM.
So i can conclude that it's safe enough
i wrote a quick proof of concept for you. You can download it and tinker with it, it is safe. all of the work is done within the process itself, no weirdo global api hooks and as I said, it does not read or write outside of its own address space. The application does not have a user interface thus when you run it, it may appear to not be running at all.
this is just simply a concept of how a program limited to usermode only can get a grasp on what has access to it. A great deal of anti-virus software will generally read out virtual memory from every running process on startup so that could easily set it off.
Now granted you could maybe suspend the main thread (since it is a single threaded program) and do some dumping but keep in mind that any decent anti-tampering mechanisms are going to be measuring time deltas, this little program however does not do that
You can download it here readmem
In order for it to function properly it must be run with administrative access rights.
Last edited by sitnspinlock; 02-26-2012 at 11:14 PM.
so then, you suppose they detect cheat engine running by enumerating image names?
i'm being sarcastic.
you do not need to explicitly "run as admin" for an application to acquire SeDebugPrivilege, as long as the application is run in the context of an administrator account.. and not say.. a normal user on some network in the workplace or something.
Last edited by sitnspinlock; 02-28-2012 at 04:53 PM.