anti-cheat-systems

安装量: 68
排名: #11316

安装

npx skills add https://github.com/gmh5225/awesome-game-security --skill anti-cheat-systems

Anti-Cheat Systems & Analysis Overview

This skill covers anti-cheat systems used in games, their detection mechanisms, and research techniques. Understanding anti-cheat helps both defenders (game developers) and security researchers.

Major Anti-Cheat Systems Easy Anti-Cheat (EAC) Kernel-mode driver protection Process integrity verification Memory scanning Used by: Fortnite, Apex Legends, Rust BattlEye Kernel driver with ring-0 access Screenshot capture capability Network traffic analysis Used by: PUBG, Rainbow Six Siege, DayZ Vanguard (Riot Games) Always-on kernel driver Boot-time initialization Hypervisor detection Used by: Valorant, League of Legends Valve Anti-Cheat (VAC) User-mode detection Signature-based scanning Delayed ban waves Used by: CS2, Dota 2, TF2 Other Systems PunkBuster: Legacy FPS anti-cheat FairFight: Server-side statistical analysis nProtect GameGuard: Korean anti-cheat solution XIGNCODE3: Mobile game protection ACE (Tencent): Chinese market protection Detection Mechanisms Memory Detection - Signature scanning for known cheats - Code integrity verification - Injected module detection - Memory modification monitoring

Process Detection - Handle enumeration - Thread context inspection - Debug register monitoring - Stack trace analysis

Kernel-Level Detection - Driver verification - Callback registration monitoring - System call hooking detection - PatchGuard integration

Behavioral Analysis - Input pattern analysis - Movement anomaly detection - Statistical improbability flagging - Network packet inspection

Anti-Cheat Architecture User-Mode Components Process scanner Module verifier Overlay detector Screenshot capture Kernel-Mode Components Driver loader Memory protection System callback registration Hypervisor detection Server-Side Components Statistical analysis Replay verification Report processing Ban management Research Techniques Static Analysis Dump and analyze AC drivers Reverse engineer detection routines Identify signature patterns Map callback registrations Dynamic Analysis Monitor system calls Track driver communications Analyze network traffic Debug with hypervisor tools Bypass Categories Memory Access Physical memory read/write DMA-based access Hypervisor memory virtualization Driver-based access Code Execution Manual mapping Thread hijacking APC injection Kernel callbacks Detection Evasion Signature mutation Timing attack mitigation Stack spoofing Module hiding Security Features Interaction Windows Security Driver Signature Enforcement (DSE) PatchGuard/Kernel Patch Protection Hypervisor Code Integrity (HVCI) Secure Boot Virtualization VT-x/AMD-V detection Hypervisor presence checks VM escape detection Timing-based detection Ethical Considerations Research Guidelines Focus on understanding, not exploitation Report vulnerabilities responsibly Respect Terms of Service implications Consider impact on gaming communities Legal Aspects DMCA considerations CFAA implications Regional regulations ToS enforcement Resources Organization Detection Research - Anti-cheat driver analysis - Detection routine documentation - Callback enumeration tools

Bypass Research - Memory access techniques - Injection methods - Evasion strategies

Tools - Custom debuggers - Driver loaders - Analysis frameworks

返回排行榜