• Amused
  • Angry
  • Annoyed
  • Awesome
  • Bemused
  • Cocky
  • Cool
  • Crazy
  • Crying
  • Down
  • Drunk
  • Embarrased
  • Enraged
  • Friendly
  • Geeky
  • Godly
  • Happy
  • Hateful
  • Hungry
  • Innocent
  • Meh
  • Piratey
  • Poorly
  • Sad
  • Secret
  • Shy
  • Sneaky
  • Tired
  • Wtf
  • At Work
  • CodenzHub
  • Coding
  • Deejaying
  • Donating
  • Drinking
  • Eating
  • Editing
  • Hacking
  • Hate Mailing
  • Jamin'
  • Lagging
  • Live Streaming
  • Lurking
  • No Status
  • Pawning
  • PC Gaming
  • PS Gaming
  • Raging
  • Reversing
  • Sipping
  • Sleeping
  • Steam Gaming
  • Trolling
  • TwitchStreamer
  • Vodka!
  • Watching TV/Movie
  • Xbox Gaming
  • Youtuber
  • Zombies
  • Page 1 of 2 12 LastLast
    Results 1 to 10 of 20
    1. #1
      Administrator
      Hacked By Jesus
       
      Sipping
       
      [GH]Rake's Avatar
      Join Date
      Jan 2014
      Location
      USA
      Posts
      3,842
      Thanks (-->)
      961
      Thanks (<--)
      1155

      How to Inject a DLL feat. the GH Injector

      How to Call Game Functions
      The GH injector has 3 DLL loading methods and 4 techniques to launch these methods. Each one offers different methods of bypassing anticheat detection. Made by Lord @Broihon



      Download @ https://guidedhacking.com/ghinjector

      First I'll start by explaining how most dll injectors work
      The most basic DLL injector works by
      Using WriteProcessMemory to write the DLL path to memory
      Calling CreateRemoteThread() which creates a new thread in the target process
      Inside this new thread you call LoadLibrary() and it loads the DLL into memory
      Then your code in your DLL starts executing

      CreateRemoteThread does not allow a user process in one session inject into a system or otherwise different session.
      If you want to inject into a system process or a process in a different session you need to use NtCreateThreadEx
      NtCreateThreadEx doesn't care about the process session

      LoadLibrary() Tells the OS to load a .dll into memory, it's just one function call nice and easy.
      Now what if an anticheat hooks LoadLibrary to detect you?

      Let's take a step back and explain a little bit of Windows Internals

      It exported by kernel32.dll, Kernel32 exposes your process to the Win32 API.
      These are the documented functions that Microsoft wants you to use.

      LoadLibrary is kind of just wrapper that calls LdrLoadDLL in the behind the scenes

      LdrLoadDll() is exposed by ntdll.dll which represents the Windows Native API which are a collection a undocumented function you can't find on MSDN
      But they've been thoroughly reversed, ntinternals.net is a great site to use

      This is your first option to use if LoadLibrary is hooked/detected by anticheat/antidebug
      Using this method, you basically are bypassing LoadLibrary

      ManualMap
      This manually maps the DLL into memory, basically emulating everything that LoadLibrary does. It handles the section relocations, relative offsets and import resolving
      This will bypass any detections based on hooking LoadLibary or LdrLoadDLL.
      Also bypasses module detection via walking the module list in the Process Environment Block

      Lets go back to the 4 techniques to start executing our code in the target process
      NtCreateThreadEx creates a thread in the target process, now what if the anticheat is watching for new thread creation?
      The next thing you could try is Thread Hijacking.

      Thread Hijacking
      You create some shell code with the DLL path in it and Write it to memory using WriteProcessMemory into some newly allocated memory space in the target process
      You find a running thread, suspend it, get the thread context, Set thread context and then resume the thread which now will execute our shellcode we injected

      SetWindowsHookEx

      Post Injection
      default = Keep Process Header
      Erase Process Header - bypass detection of module via it's header
      Fake Process Header -

      Unlink from Process Environment Block - anticheats that walk the module list in the PEB won't find your module

      Shift Module - Shifts the location of the module in memory, typically when you allocate memory for your DLL it's in a 4kb aligned page of memory.
      Anticheats can easily scan every page of memory and check for unknown PE headers at the first byte, using Shift Module will hide from that
      In most cases erasing the PE header is better

      https://guidedhacking.com/ghinjector
      https://guidedhacking.com/member.php?49430-Broihon
      https://undocumented.ntinternals.net/
      https://www.autoitscript.com/site/autoit/downloads/
      https://malwaretips.com/threads/code...nalysis.75573/

    2. Thanks iPower, Broihon, Roman_Ablo, Teuvin thanked for this post
    3. #2
      Global Moderator
      I suck
       
      Coding
       
      iPower's Avatar
      Join Date
      Jun 2017
      Location
      Brazil
      Posts
      149
      Thanks (-->)
      59
      Thanks (<--)
      78
      Gonna replace fleeps tutorial in my tutorials collection. Updating it rn.

    4. #3
      edgy 5 y/o
      __fastcall is superior
       
      Trolling
       
      Broihon's Avatar
      Join Date
      Jul 2015
      Location
      Gro▀deutsches Reich
      Posts
      950
      Thanks (-->)
      145
      Thanks (<--)
      413
      Thanks man, well explained. I appreciate. Broihon button = best button.

    5. Thanks [GH]Rake thanked for this post
    6. #4
      Jr.Hacker
      lol
       
      Sipping
       
      Roman_Ablo's Avatar
      Join Date
      Feb 2017
      Posts
      363
      Thanks (-->)
      147
      Thanks (<--)
      93
      Very nice. Browhon is indeed a great coder and a cool guy

    7. #5
      Newbie
      Learning to hack games!
       
      Feeling Normal
       
      benq1234's Avatar
      Join Date
      Dec 2017
      Posts
      1
      Thanks (-->)
      0
      Thanks (<--)
      1
      This source is good for learning and making my custom injector.
      THX

    8. Thanks Roman_Ablo thanked for this post
    9. #6
      Newbie
      Learning to hack games!
       
      Feeling Normal
       
      jahbless's Avatar
      Join Date
      Sep 2017
      Posts
      7
      Thanks (-->)
      3
      Thanks (<--)
      0
      This is some real high quality content we've got here.
      much appreciations!

    10. #7
      Newbie
      Learning to hack games!
       
      Feeling Normal
       
      iceman024's Avatar
      Join Date
      Dec 2017
      Posts
      6
      Thanks (-->)
      0
      Thanks (<--)
      0
      hello guys, new and thanks for a great site. This loader looks amazing, only issue is I cant inject my DLL into warface XENOS injector loads it but keeps disconnecting me from sever after game play, so I know the DLL is good just the injector is bad. So i was excited when I found this injector, issue is when I go to inject gives me error of the following:

      error code: 0x3
      Advance info: 0x5

      when I do manual mapping as in the old loader I used gives me error
      Error code: 0x80000002
      Advance info: 0x5

      its a kernal injection (manual mapping)

      anyway to fix this??

      thanks again for any info.

    11. #8
      edgy 5 y/o
      __fastcall is superior
       
      Trolling
       
      Broihon's Avatar
      Join Date
      Jul 2015
      Location
      Gro▀deutsches Reich
      Posts
      950
      Thanks (-->)
      145
      Thanks (<--)
      413
      Quote Originally Posted by iceman024 View Post
      hello guys, new and thanks for a great site. This loader looks amazing, only issue is I cant inject my DLL into warface XENOS injector loads it but keeps disconnecting me from sever after game play, so I know the DLL is good just the injector is bad. So i was excited when I found this injector, issue is when I go to inject gives me error of the following:

      error code: 0x3
      Advance info: 0x5

      when I do manual mapping as in the old loader I used gives me error
      Error code: 0x80000002
      Advance info: 0x5

      its a kernal injection (manual mapping)

      anyway to fix this??

      thanks again for any info.
      Those errors occur when memory allocation failed:

      #define INJ_ERR_CANT_ALLOC_MEM 0x80000002
      #define INJ_ERR_OUT_OF_MEMORY 0x00000003

      5 is the system error code ERROR_ACCESS_DENIED. This means that the injector can't allocate memory in the target process which is most likely caused by an anticheat protecting the game's memory from being accessed.
      In the current version there sadly is no way to fix this unless you have some kind of bypass to deactivate the protection.

    12. #9
      Newbie
      Learning to hack games!
       
      Feeling Normal
       
      iceman024's Avatar
      Join Date
      Dec 2017
      Posts
      6
      Thanks (-->)
      0
      Thanks (<--)
      0
      dam, ok thanks for the quick reply. Any understanding why Xenos worked now it injects but disconnects me from game after some time playing. I understand its being detected just dont know a work around :/ . Been out of the game for a while lol what happen to the old days where you can pay for a nice working hac lol

    13. #10
      edgy 5 y/o
      __fastcall is superior
       
      Trolling
       
      Broihon's Avatar
      Join Date
      Jul 2015
      Location
      Gro▀deutsches Reich
      Posts
      950
      Thanks (-->)
      145
      Thanks (<--)
      413
      Advertise on GuidedHacking
      Quote Originally Posted by iceman024 View Post
      dam, ok thanks for the quick reply. Any understanding why Xenos worked now it injects but disconnects me from game after some time playing. I understand its being detected just dont know a work around :/ . Been out of the game for a while lol what happen to the old days where you can pay for a nice working hac lol
      I don't know why the GH injector isn't able to allocate memory but Xenos is. Maybe (for some unknown reason) Xenos isn't affected by the anti cheat. I don't think that it's a bug because this is the first time that someone encounters this problem.
      Maybe Xenos doesn't allocate memory but abuses existing read/write sections or something like that. I'll take a look.

    Page 1 of 2 12 LastLast

    Similar Game Hacker Threads

    1. [Help] inject
      By elodia in forum C#
      Replies: 5
      Last Post: 08-25-2017, 02:44 PM
    2. [Help] Cant inject my dll anymore
      By MegaKillzor in forum C/C++
      Replies: 0
      Last Post: 12-27-2016, 04:00 AM
    3. [Help] I inject DLL but nothing happens
      By FloppyWhale in forum Assault Cube Hacks
      Replies: 5
      Last Post: 02-06-2016, 08:27 PM
    4. [Help] Can't inject .dll twice??
      By heanz in forum C/C++
      Replies: 8
      Last Post: 06-08-2015, 11:28 AM
    5. C# inject to browser?
      By lolaap in forum C#
      Replies: 1
      Last Post: 01-14-2015, 01:14 PM