Jump to content

Game Guardian tutorials - GameCheetah.org


Enyby
 Share

Recommended Posts

  • Administrators

Game Guardian tutorial – Basics

 
Link to comment
Share on other sites

  • Administrators

GameGuardian tutorial – Shadow Fight 2 cheat

Link to comment
Share on other sites

  • Administrators

Game Guardian fuzzy search and dealing with encryption

 
Link to comment
Share on other sites

2 hours ago, geribaldi said:

Gread guide, easy to unterstand!

Thank you. I'm trying to make complete GameGuardian tutorial, because current ones are good, but fragmented over many topics, so they are little difficult to find.
If I have written something wrong (I'm fairly new in GameGuardian, so there are probably many features and shortcuts that I have missed), or something has to be corrected, please send me a note.
Of course, any suggestions are appreciated.

Link to comment
Share on other sites

On 6/1/2017 at 8:47 AM, pajser said:

Thank you. I'm trying to make complete GameGuardian tutorial, because current ones are good, but fragmented over many topics, so they are little difficult to find.
If I have written something wrong (I'm fairly new in GameGuardian, so there are probably many features and shortcuts that I have missed), or something has to be corrected, please send me a note.
Of course, any suggestions are appreciated.

 

This is exactly what we really need. We have the most powerful hacking app on the android market and a insane talented programmer enyby who spent a big part of his lifetime into this project. I know a lot good coders, hackers and skilled modders but there are only a few where i can say "this guy life for high quality work" no bad code, no copy paste stuff....nerver "half work jobs"

 

Without enyby we would have a standard memory editor without a big difference to other tools. 

 

As i moved from pc hacking scene to android few years ago i used other tools because of "easy to use" but after i have seen that gameguardian became more and more features, more stable and more, most support for different devices, emulators etc. And last but not least a never ending development, so i went complete to this insane application. 

 

"Play games your way" (i love this sentence since more than 10 years) is unthinkable without gameguardian. But the problem is the power of this tool. Im a pro cheater but we have so much features that i can only use a small part of them. I have not the experience to use them all because i never learned to code. And 90% of our members have the same problem. We want to hack, we have biggest tool ever, but nobody know how to use.

 

Its like we have a very big p*e*n*i*s and want to fu*ck a girl but we can only do it a little bit because we dont know how to use it rightly ????

 

And thats why i give you and guys like @NoFear a very big thank for the time you spent to make guides for us "noobs" 

 

I know that's a unthankable job but you can be sure there are a lot cheaters like me what see the work behind that and im more than thankful because you help a lot with that guides.

 

Your are absolutely welcome here. Please dont care about "isnt easy to find" we give you full support on our forum and we handle that. Maybe with a gameguardian wiki what will be more clear.

 

Thank you sir's!!!

 

 

Link to comment
Share on other sites

  • Moderators
2 hours ago, geribaldi said:

 

This is exactly what we really need. We have the most powerful hacking app on the android market and a insane talented programmer enyby who spent a big part of his lifetime into this project. I know a lot good coders, hackers and skilled modders but there are only a few where i can say "this guy life for high quality work" no bad code, no copy paste stuff....nerver "half work jobs"

 

Without enyby we would have a standard memory editor without a big difference to other tools. 

 

As i moved from pc hacking scene to android few years ago i used other tools because of "easy to use" but after i have seen that gameguardian became more and more features, more stable and more, most support for different devices, emulators etc. And last but not least a never ending development, so i went complete to this insane application. 

 

"Play games your way" (i love this sentence since more than 10 years) is unthinkable without gameguardian. But the problem is the power of this tool. Im a pro cheater but we have so much features that i can only use a small part of them. I have not the experience to use them all because i never learned to code. And 90% of our members have the same problem. We want to hack, we have biggest tool ever, but nobody know how to use.

 

Its like we have a very big p*e*n*i*s and want to fu*ck a girl but we can only do it a little bit because we dont know how to use it rightly 1f60b.png??1f609.png

 

And thats why i give you and guys like @NoFear a very big thank for the time you spent to make guides for us "noobs" 

 

I know that's a unthankable job but you can be sure there are a lot cheaters like me what see the work behind that and im more than thankful because you help a lot with that guides.

 

Your are absolutely welcome here. Please dont care about "isnt easy to find" we give you full support on our forum and we handle that. Maybe with a gameguardian wiki what will be more clear.

 

Thank you sir's!!!

 

 

I would love to help create a guide on many features in GG and how to use them. It would take a really long time. Figure, the many games I've hacked, I've utilized a huge portion of features Enyby keeps adding. 

"play games your way"

This is exactly what GG provides.

I used to use sbgamehacker which was a great tool. Enyby hasn't stopped developing GG and now has the best memory hacking app. 

 

 

Link to comment
Share on other sites

  • 2 months later...

Bypassing XOR encryption in mobile games with Game Guardian

 
In the last few months we noticed increased number of mobile games that uses some sort of encryption. Some of them are simple, like multiplying value with some random number (example: let’s say random number is 8 – in that case, 10 gold in our in-game inventory will be stored as 80 in memory). This simple kinds of encryption can’t trick anyone. But XOR encryption is different story. It is one of the simplest encryption methods, but in most cases it can’t be broken (if data and key have the same length). It is often used as a part in more advanced ciphers. But we will cover this latter.
There are lot of tutorials that teach us how to bypass XOR encryption in mobile games, but most of them don’t show us process that lies behind. So before we start, we need to read some theory about the subject. If you learn this, you will be able to bypass XOR encryption with only basic memory editor, paper and pen.
Of course, this is some sort of advanced tutorial – we assume that you are at least familiar with basics of memory editing.

Cryptography 101 (logic for dummies)

cryptography.jpg

In the beginning, there was Boolean algebra. For those who haven’t overslept math and logic classes, you can skip this chapter. If you have overslept, read carefully.
George Boole was mathematician, logician and philosopher who published his most famous notes in the middle of the 19th century. You probably asked yourself why are you reading about some dude who lived 100 years before ENIAC. This dude is father of all computers – every digital circuit on our planet works on his principles.

For our story, it is important to notice that every algebra has own values and operations. Imagine that, in some sort of simple algebra, values are set of natural numbers from 1 to 10 [1,2,3,4,5,6,7,8,9], and only operations are addition(+), subtraction(-), multiplication(*), and division(/). From our knowledge of elementary algebra (math from school), you can tell that 1+1 =2, or 2*4=8.

While elementary algebra deals with numbers, Boolean algebra use only two values – TRUEand FALSE. They are represented as 1(true) and 0(false). All operations are done on this two values. Of course, you can’t preform multiplication or subtraction on this values. We need some other operations that can be preformed on TRUE and FALSE. These operations are called bitwise operations. There are three basic operations in Boolean algebra – NOT(¬), AND (∧) and OR (∨), and they are really simple to understand. Take a look at this image, and everything will be clear.

Bitwise-operations.jpg

Source: Wikipedia

Just kidding, forget this and let’s move on.

Basic bitwise operations

I know this will maybe be hard to understand, especially if this is your first time you read about logic. So I will try to make it simple. Boolean algebra (and any other logic) are made to teach us how to make correct conclusions.
In elementary algebra, correct conclusion is when we write that 1+1=2. As we said, in Boolean algebra there are only two values, and we can only preform operations on them.

Now imagine that we have a few true or false statements:

  • Tom is a cat (TRUE or 1)
  • Jerry is a mouse (TRUE or 1)
  • Sky is green (FALSE or 0)
    Tom_Tom_and_Jerry.png

NOT operator

This is fairly simple examples. Let’s see our first operator, NOT(¬). “Tom in not a cat”, is this statement true or false? Of course, it is FALSE.
Jerry is not a mouse = FALSE or 0.
Sky is not green = TRUE or 1.

This operator preforms logical negation on a given statement. 0 become 1, and 1 become 0. We can write it like this:

  • ¬0 = 1
  • ¬1 = 0

AND operator

AND(∧) operator takes two arguments, and returns TRUE only if both arguments are TRUE. Tom is a cat AND Jerry is a mouse = TRUE(1). Tom is a cat AND Sky is green = FALSE(0).
You can easily remember this operator – just multiply two arguments and you have correct result. 
We can write it like this:

  • 1 ∧ 1 = 1
  • 1 ∧ 0 = 0
  • 0 ∧ 1 = 0
  • 0 ∧ 0 = 0

OR operator

OR (∨) operator takes two arguments, and return FALSE only if both of the statements are FALSE. In every other case it returns TRUE.
Tom is car OR Sky is green = TRUE(1). Sky is green OR Sky is red = FALSE(0). 

  • 1 ∨ 1 = 1
  • 1 ∨ 0 = 1
  • 0 ∨ 1 = 1
  • 0 ∨ 0 = 0

Maybe you wonder why are we talking about Tom and Jerry. In computer world, everything is made in binary system. There are only two states in computer – there is current flow (1) and there isn’t current flow (0). So every information is stored in binary numeral system. Each digit (0 or 1) is called bit. Group of 8 bits are called byte. Any information can be translated into binary system.
So our “tom” will be 01110100 01101111 01101101 in binary, and “sky” will be 01110011 01101011 01111001. Guess what? You can preform this bitwise operations on binary values.
So, “tom” OR “sky”?

    01110100 01101111 01101101 tom
∨ 01110011 01101011 01111001 sky
____________________________
   01110111 01101111 01111101 wo}

If we want preform AND operator, this will be result:

    01110100 01101111 01101101 tom
∧ 01110011 01101011 01111001 sky
_______________________________
    01110000 01101011 01101001 pki

Well, this was not very useful. But it is important to remember this, because now you will learn another bitwise operation – exclusive disjunction (exclusive OR, known as XOR).


XOR (exclusive OR) bitwise operator

I hope you understand these basic bitwise operators. There is also so-called “secondary operators or operations”, which can be derived from basic operators. One of these secondary operators is XOR, or exclusive OR. You will understand why is it called “exclusive OR” when you see the following table.

  • 1 XOR 1 = 0
  • 1 XOR 0 = 1
  • 0 XOR 1 = 1
  • 0 XOR 0 = 0

As you can see, if you perform XOR operation on two different values, it will return 1 or true. If values are the same, it will return 0 or false. So what is the catch?
Why are XOR so special, and why is it used in cryptography? Now, look again our previous example, and you will see. From now on, we will preform XOR operation on original data (“tom” in our case) with the key (“sky” in our case).

         01110100 01101111 01101101 tom
XOR 01110011 01101011 01111001 sky
_____________________________________
         00000111 00000100 00010100 //this can't be converted to meaningful text

But what will happen if we XOR out new value (00000111 00000100 00010100) with the same key (sky or 01110011 01101011 01111001)?
Let’s try it.

         00000111 00000100 00010100
XOR 01110011 01101011 01111001 sky
___________________________________
         01110100 01101111 01101101 tom

Right, we got our original data. But there is more -what if we don’t know the key (“sky”)

         01110100 01101111 01101101 tom
XOR 00000111 00000100 00010100
___________________________________
         01110011 01101011 01111001 sky

We have out original key. This is the reason why XOR operator is special. We can’t achieve this with other operators.

XOR encryption in mobile games

So let’s see some real world example – using XOR encryption in mobile games. Imagine that you have 1000 gold in some game. Developers implemented that all values are XOR-ed with the key 1337, and stored in memory. So look at the example. For conversion for decimal to binary you can use Windows calculator, or some online tools [BINARY TO DECIMAL CONVERTER]

         0000001111101000 1000
XOR 0000010100111001 1337
_________________________
         0000011011010001 1745

This means that “1000” gold is stored as “1745” in memory. If you earn more gold (let’s say you got 1050 gold now), it will be stored in memory like this.

         0000010000011010 1050
XOR 0000010100111001 1337
_________________________
         0000000100100011 291

So how we can bypass this sort of encryption?

Bypassing XOR encryption with Game Guardian

Xor-encryption-table.jpg

We already saw that:

  • original value XOR key = encrypted value
  • encrypted value XOR key = original value
  • original value XOR encrypted value = key

With this principle, we can bypass XOR encryption even if we don’t know that key developers used. So let’s start with practical work. If you aren’t familiar with fuzzy search, it will be useful to first read this tutorial [GAME GUARDIAN FUZZY SEARCH TUTORIAL].

We are going to use examples from previous paragraph. Our first step is to find address where the encrypted value is stored.
This step is simple. First, scan for unknown starting value – this is done by selecting Fuzzy search from Game Guardian. As value type, you can choose DWORD (it was DWORD in all games that we cheated)Change the amount of gold in-game, then search for changed value. Repeat this step until only one address has left on the list.

Now it is time to check if XOR encryption is used. Let’s say you got 1000 gold in game, but with fuzzy search you found value 1745.
Preform XOR operation on this two values.

         0000001111101000 1000 //Ingame gold
XOR 0000011011010001 1745 //Value that you have found with fuzzy search
_________________________
         0000010100111001 1337 //Key? --write it down

Now change original value – earn or spend some gold. Let’s say you have 1050 gold now. Look at the address that you found with fuzzy search, and read the value.
Again, preform XOR operation with in-game value and in-memory value.

         0000010000011010 1050 //In-game value
XOR 0000000100100011 291 //Value which is stored in memory
_________________________
         0000010100111001 1337 //KEY!!

If two keys are the same, XOR encryption is used and you have found the key. If they are not, XOR encryption is not used.
Now, let’s change our gold (it was our primary goal, right?). We want 9999 gold. Again, preform XOR operation on it with key that you found (1337 in our case).

         0010011100001111 9999
XOR 0000010100111001 1337
___________________________
         0010001000110110 8758
 

Change the value that you found with fuzzy search – as new value set 8758. Open game again, and you should have 9999 gold. You can now cheat game using paper and pen, as we promised on the beginning. But it would be smarter if you use XOR calculator built in Game Guardian 
Game-Guardian-XOR-calculator-300x158.jpg

Second method to bypass XOR encryption

Now, you will see the true power of Game Guardian. For this method, it is important to note that in most games, encrypted value and key are stored next to each other in memory – for DWORD type,one value occupies 4 bytes,so the key is usually 4 bytes away from encrypted value. Look at this picture.

GOTO_address.jpg

In Game Guardian, there is builtin method which automatically search for values, and XOR them with value which is X bytes away.
That means that we don’t need to do fuzzy search, or calculate XOR values. Game Guardian can do it for us. Let’s get back to our previous example and imagine that encrypted value and key are 4 bytes away.

  • If you have 1000 gold in-game, click on Known search, as type choose Dword (it can be some other types too, but it is usually dword.)As value, put in 1000X4, and click on search. In this example, first number “1000” is amount of currency that we want to change.
    Second part, “X4“, marks how many bytes away is the key. For dword values it can be X4,X8, X12, X16
  • Earn or spend some currency – let’s say that you have 900 gold now. Now input 900X4, and click on refine.
  • Repeat previous step until you have only one address left (or few addresses if you want).
  • Click on Edit, and as a value input 9999X4.

And that’s it. Game Guardian will automatically search for encrypted values, and XOR them with key which is X bytes away. Pretty impressive feature.

With this, our tutorial has finished. There will be reference links bellow, if you want to know more about this subject.
Any suggestions are appreciated. Happy cheating.

Reference links

[Algebraic operation – Wikipedia article]
[Binary numbers]
[Boolean algebra]
[Exclusive OR – XOR, Wikipedia]
[NoFear’s tutorial – Xor search guide]
[Binary to decimal online calculator]

Link to comment
Share on other sites

  • Moderators

@pajser

Nice write up! 

I might've missed this or it wasnt mentioned, games with rotating xor key... Essentially was "near impossible", excessive amount of unknown searches and checking pairs in results for proper xor value.  The addition of the xor search in GG is so amazing. 

Thank you for the detailed information on XOR. 

Link to comment
Share on other sites

Tnx, your tutorial inspired me for writing this. 
Yep, I didn't mentioned it. I heard that there is games that change XOR key when the value change, but I didn't find any. 
Do you have any examples maybe?

Link to comment
Share on other sites

  • Administrators
53 minutes ago, pajser said:

with key which is X bytes away.

As key assumed always first value. As value - second. Then key placed always before value.

In most cases this is does not matter, because order of XOR do not change result.

_______________________________________________
added 4 minutes later

And we recently added a new function Calculate XOR, which helps to quickly calculate XOR between any two values.

Link to comment
Share on other sites

@pajser Concerning the screenshot and details on the subsection:

12 hours ago, pajser said:

Second method to bypass XOR encryption

Now, you will see the true power of Game Guardian. For this method, it is important to note that in most games, encrypted value and key are stored next to each other in memory – for DWORD type,one value occupies 4 bytes,so the key is usually 4 bytes away from encrypted value. Look at this picture.

GOTO_address.jpg

Isn't the KEY supposed to be first and Encrypted Value second?

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.