I have a trainer from sicheats.com for the game deadlight. I made a copy of the sc_key I even made a copy of the checker program for the file verification but it no longer works. I just read i can use Cheat Engine to debug this old Trainer to get it to work. Is debugging very difficult?
I found this on the old Cheat Engine forum- I don't know if the images will show here but here is a link to the original post to view the images if needed - [Link]
This is what was posted if anyone can understand it-
I recently downloaded a CoH:ToV trainer, only to find that it required a username and password to use. The website linked to by the trainer was long gone, and a mixture of Google, Wayback Machine, and historical DNS records couldn't find me the original author, so I decided to break the login validation myself.
Here's the login form:
And here's what happens when you try to log in:
So I can only imagine that the server is meant to respond with some checksum or number that validates the login, and in this case it's failing because my ISP's DNS hijacking is rerouting it to the "not found" page, which contains HTML rather than a number. Even better, we can also guess that it's looking a single digit, because the complaint is about a < character, rather than a bigger section of text.
First step was to work out which back-end server it was trying to talk to. I used Wireshark to look for DNS queries, and found that it was indeed sending one out for the sicheats.com domain:
I then filtered based on the IP address and discovered this HTTP request:
Simple! Next job is to try to play around with the responses. Now, here I had two options. The first was to set up a script that opens up a local HTTP server with responses that I can control, then use my hosts file to point sicheats.com back at 127.0.0.1, but that seemed like a bit of a pain in the ass. The second option was to mess with the responses coming back from my ISP using a packet editor. Echo Mirage is my tool of choice for messing with packets because it's simple as hell, support automated modifications, and automatically detects generic SSL libraries and gives you the raw buffers instead of the encrypted payloads. I didn't need the SSL stuff this time, but it's always nice to have.
I opened up Echo Mirage and configured a rule that auto-modified all response packets from the target IP to contain a HTTP response of just the number "1".
Next, I injected into the target process, and re-issued the request. Here's the modified response:
Unfortunately, the trainer simply did nothing. Bugger! After a bit of messing around, I discovered that having a response of "123456" would result in "2345" being shown in an information field:
This further solidifed my guess that the first number was a status, and indicated that the remaining part of the string (apart from the last character) was a status. Just to double check, I tried again with a response of "1Cheat Engine rocks!0":
After playing around, I tried "2345" as a response, and got a winner:
After a bit of experimentation, it appears that you can generate a valid response as long as your first character is a number digit larger than 1, and the total response length is 4 or more characters.
Just thought you guys would enjoy seeing something like this step-by-step.
I don't understand this! Is debugging an easier way? To me it looks like the user is using a bunch of different programs as i don't recognize the images the user is showing or he didn't explain in detail enough for me to understand. If this is all in cheat engine and this is the easiest way i'll try my best even though im not sure how he brought up some of the images like what tabs to hit to get the correct program. If anyone understands what is the easiest way to get the SICHEATS TRAINER to work again???? Please any help would be very much appreciated!
SICHEATS.COM TRAINERS
Re: SICHEATS.COM TRAINERS
So how did he use Cheat engine to hack an old Trainer? What has to be done? I wish i could just fix the old key or checker anyone know about this?
Who is online
Users browsing this forum: Google Adsense [Bot]