Reverse Engineering hidden game cheat codes [Game Hacking 101]

preview_player
Показать описание
Reverse Engineering the classic real time strategy game Age of Empires to understand how hacking functions have been implemented by game developers. Once we understand the hacks, we can binary patch the game and directly implement them too.

🏆 The 247CTF channel is dedicated to teaching Capture The Flag fundamentals. If you want to improve your technical skills and succeed in Capture The Flag competitions, make sure to subscribe!

📺 Subscribe for more Capture The Flag videos!
📌Free flag ➝ 247CTF{9719c5ddf317154473d334f47a77ac6a}

🚨 247CTF’s channel videos are intended for educational purposes only. Methods and techniques discussed are not to be used for illegal activities against unauthorised systems.
Рекомендации по теме
Комментарии
Автор

You: I hate this video 😠
Me: wololololo
You: I love this video 🤗

CTF
Автор

I love this, please make the next one soon! I really want to see how you write the exploit

InsiderPhD
Автор

This video proves that sub count is independent of quality

amfm
Автор

Subbed and shared. Quality work, keep them coming!

_amih
Автор

This is amazing! Thanks for the video. It could be great to do the same for AoE 2 or Empire Earth.

jeanyveso.
Автор

I saw Age of Empire and reverse engineering immediately subbed❤

varshneydevansh
Автор

thank you for your work mate, really appreciate it! also, your voice is incredibly soothing and perfect for explaining this stuff absolutely lovely <3

harmonyinchaos
Автор

Bro, how did you manage to put the entire program on a singlr graph? It is no easy task. Please enlighten us

mohiuddinwaresi
Автор

saw Reverse Engineering immediately subbed

angryman
Автор

Can you make a video talking about assembly? You explain really well, but I've felt a bit lost.

eneomaos
Автор

Did anyone ever notice the obfuscated cheats were from the base game? (From ancient memory it seems to align)

draknyte
Автор

Nice video but I don't understand why the transposition table uses 4 byte values to store 2 char values with 2 null bytes, wouldn't it be easier to use cx instead of using ecx? Also why does the function use both ecx and edx to access these characters when it can be accessed by using cl and ch.
Is this some form of code obfuscation or just a compiler quirk?

NoxernPL
Автор

Very interesting! Maybe you have heard that ubisoft has shut down The Crew 1, an always online racing game that has an integrated offline mode not available for normal players. Could the same or a similar method be used to make this offline mode available?

QWERTZ-NOOB
Автор

Waiting for more videos from this series

darklord_
Автор

Such a good video
Got any good resources to practice reverse engineering for a real world problem? with solution?

ahmedlimam
Автор

Can you show a bit more on how you use Binary Ninja? Not everyone is super familiar with the tool. Better yet would be to use a free alternative like Ghidra or Cutter

kotosif
Автор

I love video as well as call music theme in background . Could you give name of track?

abeard
Автор

if you continue with this pattern, you'll beat live over flow in no time

ibnsaltus
Автор

Very nice video mate keep up the good work, do ya recommend any resources to start learning how to reverse engineering because even so your video overall is well explain and understandable i still need to learn a lot lol

CoopPlaysYoutuber
Автор

bro thank you so much I can watch these instead of cs420

redcloak