Recommend the packet collector usage stop
Moderator: Team Members
-
skandragon
- Posts: 27
- Joined: Tue Jan 15, 2008 11:24 pm
- Location: Oklahoma
- Contact:
Recommend the packet collector usage stop
I sent this to LethalEncounter directly, but he misunderstood my reasons.
I recommend no one use the packet collector. They have, or will be implementing countermeasures.
This is not because of the packet collector but because of other memory-reading and monitoring methods which people cheating with high-speed movement are using, as well as other cheats.
I recommend no one use the packet collector. They have, or will be implementing countermeasures.
This is not because of the packet collector but because of other memory-reading and monitoring methods which people cheating with high-speed movement are using, as well as other cheats.
- John Adams
- Retired
- Posts: 9684
- Joined: Thu Jul 26, 2007 6:27 am
- EQ2Emu Server: EQ2Emulator Test Center
- Characters: John
- Location: Arizona
- Contact:
-
Andrew
- Retired
- Posts: 71
- Joined: Fri Dec 14, 2007 8:33 am
- Location: England
- Contact:
-
skandragon
- Posts: 27
- Joined: Tue Jan 15, 2008 11:24 pm
- Location: Oklahoma
- Contact:
I'm not certain, but if I wanted to counteract the botting programs which read and modify process memory to look at or change their world, I'd do this:
(1) Find anyone attempting to attach to this process.
(2) Find if there are any breakpoints set. That is, if we are running under a debugger.
(3) Have a thread (or unrelated functions) call a memory verification routine which did a CRC or other checksum against known values, for certain parts of their application.
I'm certain Sony programmers are clever, I'm just not certain they are devious:
(4) Let the client have bogus values which appear right, but will run people off cliffs or make it obvious they are cheating. They did this with EQ1 using evil easter eggs: talk about things that only cheaters can see, and you get nailed.
(5) Embed a known and trusted RSA public key in the server, and make it fairly hard to find using XOR tricks or the like.
(1) Find anyone attempting to attach to this process.
(2) Find if there are any breakpoints set. That is, if we are running under a debugger.
(3) Have a thread (or unrelated functions) call a memory verification routine which did a CRC or other checksum against known values, for certain parts of their application.
I'm certain Sony programmers are clever, I'm just not certain they are devious:
(4) Let the client have bogus values which appear right, but will run people off cliffs or make it obvious they are cheating. They did this with EQ1 using evil easter eggs: talk about things that only cheaters can see, and you get nailed.
(5) Embed a known and trusted RSA public key in the server, and make it fairly hard to find using XOR tricks or the like.
-
link2009
- Retired
- Posts: 390
- Joined: Fri Aug 10, 2007 5:59 pm
- Location: POrTal
- Contact:
-
techguy84
- Posts: 187
- Joined: Wed Jul 25, 2007 4:56 pm
- Location: Qeynos Guard Shack
- Contact:
Who is online
Users browsing this forum: No registered users and 0 guests
