This question is little complex. I want to hide "cheat engine" from some detecter programs.They're checking cheat engine name in running program list,and checking memory for some special strings or data for detect that program. How can i make completely undetectable program (known).
I tried some tricks like "Windows Title Changer".But those detecters are checking memory for detecting.So i should change memory data for that program.But i dont know how can i make do that. Any idea?
Thank you in advance..
How can i make completetly undetectable program ( a program known)?
2.5k Views Asked by erginduran At
1
There are 1 best solutions below
Related Questions in SECURITY
- Can MVC.NET prevent SQL-injection at razor or controller level?
- Forgotten password reset page: should the user need to enter a username/email as well?
- Dynamic roles list in CustomAuthorize ASP MVC
- Access roles from multiple applications
- How to Fix TLS CBC Incorrect Padding Abuse Vulnerability on Windows 2003 Server
- Evernote Web Clipper and Content Security Policy
- Invalidate user credentials when password changes
- Spring Boot MVC non-role based security
- Correct Captcha behaviour on error
- Is macro more secure than static const if I don't want someone to know or change the hardcode value?
- In Android, ensuring only pre-decided users can only use the app
- Authenticating plain text passwords against md5 hash in DB using Apache Shiro
- Symfony2 - handle HTTP/Entity user access restrictions
- Client side computation without exposing code?
- searchable row level encryption using java?
Related Questions in MEMORY-EDITING
- possible to read specific types from memory?
- Memory modification when using strtol() and atoi() functions
- JavaScript Iterative Variable Filtering
- How can i make completetly undetectable program ( a program known)?
- How to find the starting address of an application for memory editing a process?
- C# ReadProcessMemory alternative
- How does GameShark / Action Replay work on modern consoles?
- Update DataBase on button click, after editing gridview (not automatically saving in DB, but after confirming on any event) within using transactions
- C# - Byte array to Hex string
- How is it possible for an application to have static memory addresses?
- What is the benefit of offsets to pointers?
- Dereferencing a double-level pointer results in different behaviour from dereferencing a single-level pointer
- Best Practices for DLL Injection?
- How do I edit opcodes or write memory or edit bytes in C++?
- What is the cleanest way to dereference multi-level pointers with offsets?
Related Questions in CHEAT-ENGINE
- How do I get the (physical) baseaddress of an .DLL used in a process?
- Using Cheat Engine to accelerate time in a Flash program
- cheat engine debug breakpoint on IDA function addresses
- Some confusion with cheat engine function address and IDA subrutine
- Click Event On Object Created Using WINAPI in CE Lua
- Can i find memory adress of moving or making actions in games
- find out what instructions write to this memory address olly dbg cheat engine
- How can I avoid cheat engine to see my strings at runtime
- Where is the difference between those two Assembly code snippet's?
- Memory Access Control in Windows Memory Management
- Cheat engine address to Intptr?
- Does GDB support deductive memory scanning, like Cheat Engine?
- Executing function in other process through dll injection
- Why is id different through id() and through the cheat engine?
- How to read register values at specific instructions in C++ like Cheat Engine does?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Your goal is not to make a program "completely undetected" but rather to just bypass the detection mechanisms that exists in the anti-cheat/anti-debug routines the developer utilized. The reason is because you cannot make something "completely undetected", it's a cat and mouse game and you only need to stay one step ahead or update when necessary to bypass again once you become detected.
The solution is to reverse engineer the methods of detection, half of this is trial and error and the other half is reversing the assembly instructions that are being executed and figuring out what they do. This is truly an art form. You also want to consider learning how cheat engine works as certain techniques it uses such as attaching a debugger and opening a handle to the process can be detected.
To bypass string detection you can open CheatEngine.exe with a hex editor, do a find and replace on the string "Cheat Engine" and replace it with gibberish, don't forget to do unicode as well. You must also change the folder name as it also includes the offending string. This detects basic detection of Cheat Engine. The next step up from there is detection of a debugger by using IsDebuggerPresent() or by manually checking the debugger flag in the Process Environment Block or PEB. You can bypass those by patching the function or overwriting the flag in the PEB.
There are near limitless ways to detect unauthorized access to the memory of a process.
Peter Ferrie wrote "The Ultimate Anti Debugging Reference" which is a must read.