Memory Scanning & Resource Hacking with Cheat Engine [Game Hacking 101]

HomeGames, Other ContentMemory Scanning & Resource Hacking with Cheat Engine [Game Hacking 101]
Memory Scanning & Resource Hacking with Cheat Engine [Game Hacking 101]
Memory Scanning & Resource Hacking with Cheat Engine [Game Hacking 101]
Learn to influence how Age of Empires works by directly finding and modifying data in the process memory by making use of Cheat Engine.

If we can find a pointer to the base address of the player object in memory, we can then dereference and follow that pointer, then once we have the dynamic location, we can follow offsets from that dynamic base address to find and modify the player’s resources – an infinite resource cheat.

Game Hacking 101 Playlist https://www.youtube.com/playlist?listPLpnX4b2uRf5-_aLRjuIpav2Zh45C4f2QH

Fair use of copyrighted material in the context of Age of Empires (video game); https://en.wikipedia.org/wiki/File:Age_of_Empires_Coverart.jpg / https://en.wikipedia.org/w/index.php?curid11648702 and Counter Strike (video game); https://store.steampowered.com/app/240/CounterStrike_Source/

Material presented for offline learning purposes only. No content regarding modern online games or detection bypass techniques will be discussed.

The 247CTF channel is dedicated to teaching Capture The Flag fundamentals. If you want to improve your technical skills and succeed in Capture The Flag competitions, make sure to subscribe!

The 247CTF is a free Capture The Flag learning environment where you can improve your technical skills by solving challenges and recovering flags. You can join now for free at https://247CTF.com/.

Subscribe for more Capture The Flag videos!
Solve CTF Challenges https://247CTF.com/
Stay up to date https://twitter.com/247CTF
Support the 247CTF https://www.patreon.com/247CTF
Discuss and learn https://discord.gg/eS74p5zWZX
Free flag 247CTF{9719c5ddf317154473d334f47a77ac6a}
Icons made by Freepik & Monkik from Flaticon.com

247CTF’s channel videos are intended for educational purposes only. Methods and techniques discussed are not to be used for illegal activities against unauthorised systems.

Take the opportunity to connect and share this video with your friends and family if you find it useful.

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *