(C++) Function Detouring Tutorial (Internal Game Hacking)

Поділитися
Вставка
  • Опубліковано 11 січ 2025

КОМЕНТАРІ • 43

  • @mihalylorinc1364
    @mihalylorinc1364 6 років тому +33

    do an assembly tutorial please, there is really not much about it. good content as always tho.

  • @winifix
    @winifix 5 років тому +6

    Please could you explain how to convert this to x64, since _asm is not aupported

  • @gangstasteve5753
    @gangstasteve5753 4 роки тому +1

    that was a very good explanation at the beginning!

  • @Jxhsxn
    @Jxhsxn 6 місяців тому +1

    background music go hardd 🔥🔥

  • @dennis2599
    @dennis2599 3 роки тому +1

    22:51 I like that Fu*********** folder

  • @Nilrem8
    @Nilrem8 6 років тому +3

    Why do you have len when it doesnt even matter because the relative address can only be 4 bytes long and the jmp is always 1 byte long?

  • @waleedahmed7677
    @waleedahmed7677 4 роки тому +1

    which option you selected in new project->C/C++-> WHICH option? is it .dll or windows console?

  • @depriikid
    @depriikid 3 роки тому +1

    heya! this video is kinda old i know, i know. but just in case you're going to read this or.. anyone else with the proper experience.. i followed the tutorial and did end up with the same result, i also tried to rewrite it on my own a few times and happened to bump into things i can't quite explain. what's the reason for such return types we have to use for the dllmain and the actual thread, i seem being able to execute the code no matter if i leave the winapi out or use void as return type etc... kinda puzzling. also is there any reason we use DWORD as datatype instead of uintptr_t? it doesn't matter probably but i'm not sure. also i tried to write different assembly in my method but it doesn't change anything apparently. i checked the memory address in cheat engine and it does correctly jump into my function and NOPs the bytes i wanted to overwrite but it seems my assembly doesn't have any effect on the application (it's pretty much the same one you showed, probably slightly different but same procedure). when i put some console log in there instead it does actually print whatever i included in the console but assembly doesn't seem to work for me. i included the assembly past my console log to get back in memory so that works heh. if you have any idea i would really appreciate the help, thanks a lot for the video anyway it was really helpful and combined with other material very good material to get a better understanding of the topic!

  • @jacklin8979
    @jacklin8979 3 роки тому

    Please could you explain how to convert this to x64, since _asm is _declspec(naked) not aupported

  • @YourFutureGf_
    @YourFutureGf_ Місяць тому

    Great tutorial but it's not actually working because you stomped th eax move when you went 8 bytes?

  • @kibeyt
    @kibeyt Рік тому

    how do you know that the hp is stored on the eax register?

  • @JackAdams0
    @JackAdams0 Рік тому

    great tutorial. Will this work in x64 processes too? inline assembly doesn't work in x64 architecture visual studio. but what about the detour you showed?

    • @evitable1337
      @evitable1337 Рік тому +4

      no it wont, for x64 it's different because the jmp instruction is FF 25 00 00 00 00, etc it has 14 bytes minimum

  • @Ambroxan
    @Ambroxan 3 роки тому

    Hey you didn't nop the unused bytes, what happened to those 3 unused bytes? are they auto nop'ed by the compiler?

  • @ivankurniawan6825
    @ivankurniawan6825 2 роки тому

    How do I make it externally?

  • @rollo4127
    @rollo4127 5 років тому

    Can you make a tutorial about internal game hacking

  • @depralexcrimson
    @depralexcrimson 6 років тому +3

    Dude I love your tutorials, I downloaded them all and I really want and hope to learn this stuff :) Because I love catching cheaters and I need to know how shit works before catching them, I'm not catching CSGO cheaters in particular but I do love to check pc's remotely in 1.6.
    Also I'll donate whenever I can, I promise :)

    • @null7953
      @null7953  6 років тому

      deprcsgo Appreciate it!

  • @alexasmr3047
    @alexasmr3047 5 років тому

    Thanks. assembly tutorial would be cool

  • @Humnbrd
    @Humnbrd 6 років тому +1

    yay

  • @jamesakaiz0124
    @jamesakaiz0124 2 роки тому

    finally i found game hacking videos thank help me alot . can you make video persent1 hook or expl the consept hook bro ?

  • @openai.
    @openai. Місяць тому

    is old man peeing ? in corner

  • @kranefivem
    @kranefivem 5 років тому

    or you can read the current value, compare it with when it changed and add the result, it works better if the health taken is random, like getting shot by different weapons

  • @casualgamer1791
    @casualgamer1791 5 років тому

    nice one. keep it up!

  • @ThePCxbox
    @ThePCxbox 4 роки тому

    Assembly tutorial plz? Also sick beats. Its sex musik

  • @xtkb1gpaster4
    @xtkb1gpaster4 6 років тому +1

    king

  • @le_plankton
    @le_plankton 2 роки тому

    my man is epic

  • @m4gicpi3
    @m4gicpi3 6 років тому +1

    thank you

  • @DarkbrainixSlickerTH
    @DarkbrainixSlickerTH 3 роки тому

    nice tut

  • @mkdustan
    @mkdustan 6 років тому +1

    skrt skrt nice voice

  • @corejake
    @corejake 3 роки тому

    okay

  • @-dead-3787
    @-dead-3787 4 роки тому

    Error LNK1120 1 unresolved externals Function Detouring Tutorial C:\Users\oneon\source
    epos\Function Detouring Tutorial\Debug\Function Detouring Tutorial.exe 1
    Error LNK2019 unresolved external symbol _main referenced in function "int __cdecl invoke_main(void)" (?invoke_main@@YAHXZ) Function Detouring Tutorial

  • @rick.prime137
    @rick.prime137 Рік тому

    thx

  • @Max-ig4ji
    @Max-ig4ji 3 місяці тому

    stop saying you are god and some shit

  • @RandomRepository1024
    @RandomRepository1024 Рік тому

    jmp inside _declspec(naked) void ourFunc() dont return to right address.