Author Topic: So you like to hack?  (Read 7169 times)

L. Spiro

  • *
  • Posts: 797
    • View Profile
    • http://www.memoryhacking.com/index.php
So you like to hack?
« on: 2004-06-14 12:43:05 »
Memory Hacking Software

Over a year’s production put into it, it is closer to complete than when I started it.

This should satisfy all hacking needs, but there are plenty of features in store for the future, including a possibly faster searching routine.

This software was sent to Irrational Games for hacking Tribes:Vengeanceâ„¢ and to id Software for their programmers to hack Doomâ„¢ 3.
According to id Software, they were able to hack “hidden” data with it that was not supposed to be able to be located.

I used it to make my universal auto-aim and to hack all games I hack.
When I needed a new feature, I simply added it.
It helps that way.

As for the features, since they are not listed very well on my site, and the ReadThis.txt is very outdated, I will explain them here.



After a New Search you can perform a “Changed By” subsearch.  This allows you to do an “Unknown” search and then calculate how the value (in the game) has changed and then tell the program to search for values changed by that amount.
It also has a very useful feature in the subsearch: Same as Original.
I plan to add more to this later, but for now it is the only search engine with this feature and is very helpful for unknown values.
If your E-Bar is at 100% but you do not know the actual number they used to store “full energy”, you can do an Unknown, then take damage, do a “Less Than” search, refill your energy, and then search for “Same as Original”.

After you have added a value to the main address list, you can see all memory data regarding the address.
Click the address and hit “I” (this is a hidden feature so pay attention).

You can then tell which addresses are static or if they move, etc.

Pointer searches make finding pointers a breeze.  Why would you need to find pointers?  What if the data you want moves every time your character respawns?
You need the pointer to the data of the character to keep track of where the character is in memory.
In the future, a feature to lock stored addresses to pointers will be added so that when a pointer moves the location of the memory you want to study/lock, the memory hacker will automatically move to the new location with the addresses in your main list still in tact.

Group searches?
Another first-and-only.  Let’s say you have a group of mostly unknown data.  It has maybe 30 bytes total (an unlikely example) and you know that some of the bytes are FF, 00, A0, 30, 20, and 4D (maybe you have a texture file or a bitmap, etc.).  Well you can figure out the rest.

String searches.  Common but never before with these features.
Many games store text at an offset, for example, Final Fantasy® VII storing them 32 bytes from their ASCII representatives.
So, “Albert” would become “!LBERT”, and instantly all other string-searching tools are rendered useless, unless you already know the offset value of 32, thereby allowing you to search for “!LBERT”.
My program allows you to search for all (or any number of) offsets, in the likely event you do not know if the strings are stored at an offset.
In case your “string” has a 0 character, you can use the converter tool to easily type the string into a hex line, adding 00 as you wish, and adding more characters after that.  You can search for multiple strings this way, or strings that are not actually text, and therefor could contain a 0 (be sure “String as Hex” is checked).

The RAM Watcher allows you to view RAM in real time.
You can access it directly, but also after a search.
When you have opened the results list, showing all the values the search has found, you can right-click an address from that list to open the RAM Watcher to that location and view it in real-time before adding it to the main list, in case you have two values that are very similar and you do not know which one you should add.  

The exporter should help a lot with any data files you would like to export.
It explains itself.


After you have done a search and there are a some “found addresses”, you can load the list view to see those addresses (same place where you right-click to launch the RAM Watcher).
There is a Zero All button.  Generally this is risky but you can use it to see if you are on the right track in your searching.
One example was in Perfect Darkâ„¢.  By walking on land and checking Joanna’s Z position, I can tell that the floor as it 480 units.  By searching for all floats at this height, I get two main sections of data which could match the map data.
Using Zero All, Joanna falls through the floor and the map becomes graphically tangled (though the floor itself is drawn correctly because the polygons and textures are stored in graphics RAM).
Now I know for sure one, or both of those sections reveal information about the map where I was playing.
Simpley restarting the map loads it correctly and I can export those two data sets seperately and also research each section more to figure out how they relate to the map.
One section is the collision data for that area and the other is a viewfield.  Modifying the vewfield makes random parts of the map visible depending on your position and of course modifying the collision data makes you fall to the position of the new floor.

There should be enough options for all, and I am open to suggestions for future releases.
Irrational Games asked me not to release this as it is quite powerful and could aid in the making of an auto-aim for Tribes:Vengeanceâ„¢, but since they asked me how to make their game secure, then DID NOT IMPLIMENT WHAT I TOLD THEM TO DO, and probably will not even put my name in the credits, I no longer really care.
id Software has given me permission because they implimented the changes I told them to do, and thus this tool is not capable of helping in the making of an auto-aim for Doomâ„¢ 3.



For the future, I certainly plan to make a graphical display of the RAM, showing each chunk and its location.
Clicking a chunk would then show more information about the chunk, including pointers and their targets.
Also an ASM viewer.
Also for general search features, such as a “Range” subset of the “Changed By” subsearch.
Then you can search for values that have “Changed By” any number between so-and-so, rather than the exact number you specify.


Try it out and tell me what you think.
I am eager for input on this project.
If needed, I can make another post later about how to use the pointer features as they are the trickiest and most specialized features.

DeadLajik

  • *
  • Posts: 53
    • View Profile
So you like to hack?
« Reply #1 on: 2004-06-16 00:29:48 »
I didn't try this, but is it free? I don't like running EXEs onto my system when there is no web page or legitament company to stand by the product.

I don't understand what you mean by "Group searches". Most hex editors allow you to do this.

BTW, there is a program that allows you to read, and write to a processes memory space called WinHEX.  Ofcourse you do have to register it to get that functionality but it is worth it.  I used it to find a registration key in an EXE written in VB, that didn't use a "strcmp" call.

I know your product isn't really a hex editor, but since it has some of the same functionities I thought I would compare it to one.

Anyways good work.

L. Spiro

  • *
  • Posts: 797
    • View Profile
    • http://www.memoryhacking.com/index.php
So you like to hack?
« Reply #2 on: 2004-06-16 02:22:23 »
The software is free for now.

And of course you can trust the software.  I just find making web pages completely and totally boring as they can not do much of anything but look nice, and sometimes a few extra whistles and bells which take more effort than they are worth.

Technically, id Software stands by the software, though not necessarily officially.  In a final version, it will probably be posted on their site or a site hosted by them, and that version will most likely not be free, but perhaps only $15 (very inexpensive for this).

There is documentation describing group searches more thouroughly on its way, whenever Trickster puts it on the site.  He is the only person with access to the site as it is a secure network.
The documents describe everything fully.


The documents will be loaded here, but ReadThis.txt is an old file and should not be viewed.
The new files will be Memory Hacking Software.doc and Memory Hacking Software.txt.

Nori

  • *
  • Posts: 792
    • View Profile
L. Spiro
« Reply #3 on: 2004-06-16 03:22:46 »
This is really awesome (Shawn - Very Well Done!!!)
Much better than GameHack:
http://www.gamehack.com/ (Windows 95/98 Only) :(

For those of you who wants to:
Edit the Final Fantasy VII & VII PC Properties:
EX: Save Anywhere, Infinite HP, Infinite MP & Many More...

I guess you have to find the proper:
Address:
Type: (4 Bytes & Etc)
Base:

EmperorSteele

  • *
  • Posts: 933
    • View Profile
So you like to hack?
« Reply #4 on: 2004-06-16 23:41:34 »
Finally, an XP replacement for gamehack!  Oh, wonderful day!

I think i'll wait on dling this though, just to be safe =)

Yare

  • *
  • Posts: 17
    • View Profile
Whelp
« Reply #5 on: 2004-07-16 18:33:51 »
Used the program, worked fine,

but when I rebooted, my XP installation was totally hosed. Wouldn't even boot into safe mode. Couldn't repair it from the install disk, either.

I had to install a new copy of XP over the old one, which breaks any installed programs that use the registry as many people might already know.

Never seen XP do anything like that on a whim. And your program was the only one I downloaded and used yesterday.

L. Spiro

  • *
  • Posts: 797
    • View Profile
    • http://www.memoryhacking.com/index.php
It wasn’t MemHack.exe
« Reply #6 on: 2004-07-18 03:18:20 »
I can guarantee it was not my program.
And what you say sounds reasonably suspicious anyway.
I sure you couldn’t be NoFiX, but the rest of everyone should check out this topic:
http://forum.game-deception.com/forumdisplay.php?f=41
It starts the normal way, until secrax starts flaming my work for no reason.

It turns out to be a “friend” rival of mine trying to trash my work, for whatever reason.
Now, I am sure you could not possibly be Mr. secrax (NoFiX), but it sure feels strange, given that my program can not produce the results you listed.  Destroying Windows® XP?

Why would I do that anyway?  I am part of the development team here, so what kind of balls would I have to use this forum to post a virus/malicious program?  And you show up just as secrax gets banned from that forum.
Like NoFiX did a search for my name to find other forums where I post and then posts this to make everyone afraid of my work.

The new version has many great features, none of which are malicious, and you can see in that forum that everyone there who downloaded it got fine results (except secrax, who does not count).


IF you are worried, just read that forum.
If you are still afraid, oh well.  Nothing more I can do until you try it for yourself.

L. Spiro

Red_Wraith

  • *
  • Posts: 26
    • View Profile
So you like to hack?
« Reply #7 on: 2005-01-15 11:53:20 »
I'd like to test this program but the link doesn't work. I haven't been able to find another place where to download it either. Could someone please upload it (again)?

Cya

L. Spiro

  • *
  • Posts: 797
    • View Profile
    • http://www.memoryhacking.com/index.php
So you like to hack?
« Reply #8 on: 2005-01-15 17:01:40 »
http://www.microsqft.com/files/memhack_2.0.2.0.zip

Updated today especially for Nori.
Now converts GameHack save files so they can be opened with Memory Hacking Software.


L. Spiro

Red_Wraith

  • *
  • Posts: 26
    • View Profile
So you like to hack?
« Reply #9 on: 2005-01-15 19:46:54 »
Quote from: L. Spiro
http://www.microsqft.com/files/memhack_2.0.2.0.zip

Updated today especially for Nori.
Now converts GameHack save files so they can be opened with Memory Hacking Software.


Thank you!


Cya

Red_Wraith

  • *
  • Posts: 26
    • View Profile
So you like to hack?
« Reply #10 on: 2005-01-15 20:24:24 »
Quote from: L. Spiro
There is documentation describing group searches more thouroughly on its way, whenever Trickster puts it on the site.  He is the only person with access to the site as it is a secure network.
The documents describe everything fully.

The documents will be loaded here, but ReadThis.txt is an old file and should not be viewed.
The new files will be Memory Hacking Software.doc and Memory Hacking Software.txt.


This link doesn't work. It would be nice if you could fix it.

Cya

L. Spiro

  • *
  • Posts: 797
    • View Profile
    • http://www.memoryhacking.com/index.php
So you like to hack?
« Reply #11 on: 2005-01-17 01:57:59 »
My site does not exist anymore but the documents are included in the file in the link I gave here last post.


[EDIT]
Actually I forget there were documents on my site that had more details about other things.  I will have to secure those documents from my hard drive in America.
[/EDIT]


L. Spiro



P. S.:  I just found this in my g-mail box.  I mailed it to myself long ago to preserve it as I have no hard drive or computer.
Instructions on how to use this software.
http://www.microsqft.com/files/memory_hacking_software.doc