[Question] About Warden menu

User Tag List

Page 1 of 2 12 LastLast
Results 1 to 15 of 23
  1. #1
    RottenKitten's Avatar Banned
    Reputation
    1
    Join Date
    Feb 2012
    Posts
    2
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    [Question] About Warden

    Sorry for my stupid question guys, if it was mentioned somewhere.

    Can warden detect memory read? Is it possible only to detect memory write?

    So, basically: Are using memory reading and window's SendInput fully safe for a bot?

    [Question] About Warden
  2. #2
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    it could. but in it's current form does not.

  3. #3
    Bananenbrot's Avatar Contributor
    Reputation
    153
    Join Date
    Nov 2009
    Posts
    384
    Thanks G/R
    1/3
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Keyboard messages sent vie SendInput have an 'injected' flag set. WoW could easily check for that, but could never use it as a ban reason.

  4. #4
    yossarian87's Avatar Corporal
    Reputation
    10
    Join Date
    Jan 2012
    Posts
    19
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    it could. but in it's current form does not.
    How could they possibly detect memory reading?

  5. #5
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by yossarian87 View Post
    How could they possibly detect memory reading?
    there are a few ways to detect memory reading of your userspace process. maybe you should look into it. and no, I don't mean a global api hook ;p

  6. #6
    yossarian87's Avatar Corporal
    Reputation
    10
    Join Date
    Jan 2012
    Posts
    19
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    there are a few ways to detect memory reading of your userspace process. maybe you should look into it. and no, I don't mean a global api hook ;p
    Maybe I'm clueless but I spent a half hour googling everything I could think of and I never found anything about detecting memory reads between processes. I realize that kernel code could probably do it quite easily but my understanding was that WoW didn't run any kernel code. Maybe you can clue me in? I'm more than just a little curious about how to do this in user space.

  7. #7
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    actually you know what, I ran out of spoons. Here is a book

    http://technet.microsoft.com/en-us/s...rnals/bb963901
    Last edited by sitnspinlock; 02-20-2012 at 01:40 AM.

  8. #8
    SwInY's Avatar Member
    Reputation
    29
    Join Date
    Jul 2009
    Posts
    97
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    actually you know what, I ran out of spoons. Here is a book

    Windows Internals Book
    PMSL

    Quote of the day for sure.

  9. #9
    RottenKitten's Avatar Banned
    Reputation
    1
    Join Date
    Feb 2012
    Posts
    2
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    So i can conclude that it's safe enough

  10. #10
    mckemo's Avatar Member
    Reputation
    108
    Join Date
    Jan 2008
    Posts
    449
    Thanks G/R
    0/0
    Trade Feedback
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by RottenKitten View Post
    So i can conclude that it's safe enough


    it is safe because you could have a virtualization running. if your ram is virtualized, then an another program could have this done and monitor this. so they can never use it as a ban reason

  11. #11
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    i wrote a quick proof of concept for you. You can download it and tinker with it, it is safe. all of the work is done within the process itself, no weirdo global api hooks and as I said, it does not read or write outside of its own address space. The application does not have a user interface thus when you run it, it may appear to not be running at all.

    this is just simply a concept of how a program limited to usermode only can get a grasp on what has access to it. A great deal of anti-virus software will generally read out virtual memory from every running process on startup so that could easily set it off.

    Now granted you could maybe suspend the main thread (since it is a single threaded program) and do some dumping but keep in mind that any decent anti-tampering mechanisms are going to be measuring time deltas, this little program however does not do that

    You can download it here readmem

    In order for it to function properly it must be run with administrative access rights.

    Last edited by sitnspinlock; 02-26-2012 at 11:14 PM.

  12. #12
    Frosttall's Avatar Active Member
    Reputation
    64
    Join Date
    Feb 2011
    Posts
    261
    Thanks G/R
    16/3
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    i wrote a quick proof of concept for you. You can download it and tinker with it, it is safe. all of the work is done within the process itself, no weirdo global api hooks and as I said, it does not read or write outside of its own address space. The application does not have a user interface thus when you run it, it may appear to not be running at all.

    this is just simply a concept of how a program limited to usermode only can get a grasp on what has access to it. A great deal of anti-virus software will generally read out virtual memory from every running process on startup so that could easily set it off.

    Now granted you could maybe suspend the main thread (since it is a single threaded program) and do some dumping but keep in mind that any decent anti-tampering mechanisms are going to be measuring time deltas, this little program however does not do that

    You can download it here readmem

    In order for it to function properly it must be run with administrative access rights.

    Thank you, but what about programs, which run in kernelmode? Is that program still able to detect the access?

    Additional shouldn't you forget, that WoW runs without Administrator rights, so we don't have to worry atm.

  13. #13
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Frosttall View Post
    Thank you, but what about programs, which run in kernelmode? Is that program still able to detect the access?

    Additional shouldn't you forget, that WoW runs without Administrator rights, so we don't have to worry atm.

    actually it does, it just isn't explicit. wow reads virtual memory out of each process in the desktop session on startup.

    for example, open cheat engine -> then start wow

  14. #14
    anon38's Avatar Member
    Reputation
    1
    Join Date
    Feb 2012
    Posts
    18
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by everdox View Post
    actually it does, it just isn't explicit. wow reads virtual memory out of each process in the desktop session on startup.
    Sorry dude - but I'm not buying that. If it did that, then every user running on Windows Vista or newer with UAC turned on would be prompted for administrative privileges every time he/she ran WoW and the WoW forums would be full of people bitching about it.

  15. #15
    sitnspinlock's Avatar Elite User CoreCoins Purchaser
    Reputation
    398
    Join Date
    Sep 2010
    Posts
    439
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    so then, you suppose they detect cheat engine running by enumerating image names?

    i'm being sarcastic.

    you do not need to explicitly "run as admin" for an application to acquire SeDebugPrivilege, as long as the application is run in the context of an administrator account.. and not say.. a normal user on some network in the workplace or something.
    Last edited by sitnspinlock; 02-28-2012 at 04:53 PM.

Page 1 of 2 12 LastLast

Similar Threads

  1. Some newb questions about Warden
    By Tambel in forum WoW Memory Editing
    Replies: 2
    Last Post: 02-17-2015, 05:16 AM
  2. Some questions about warden
    By temp321 in forum WoW Memory Editing
    Replies: 6
    Last Post: 05-21-2014, 01:22 AM
  3. [Bot] Question about warden detection.
    By =manzarek= in forum WoW Memory Editing
    Replies: 5
    Last Post: 09-15-2012, 03:29 PM
  4. Question about warden and Blackmagic
    By SwInY in forum WoW Memory Editing
    Replies: 8
    Last Post: 08-18-2009, 02:35 AM
  5. Question about warden
    By gravestalker in forum World of Warcraft Emulator Servers
    Replies: 0
    Last Post: 11-17-2007, 11:23 AM
All times are GMT -5. The time now is 02:43 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search