Book description
Game Hacking shows programmers how to dissect computer games and create bots.
Publisher resources
Table of contents
- Cover Page
- Title Page
- Copyright Page
- About the Author
- About the Technical Reviewer
- Brief Contents
- Contents in Detail
- Foreword by Dr. Jared DeMott
- Acknowledgments
- Introduction
-
Part 1: Tools of the Trade
- Chapter 1: Scanning Memory Using Cheat Engine
- Chapter 2: Debugging Games with OllyDbg
- Chapter 3: Reconnaissance with Process Monitor and Process Explorer
- Part 2: Game Dissection
-
Part 3: Process Puppeteering
- Chapter 7: Code Injection
- Chapter 8: Manipulating Control Flow in a Game
-
Part 4: Creating Bots
- Chapter 9: Using Extrasensory Perception to Ward off Fog of War
- Chapter 10: Responsive Hacks
- Chapter 11: Putting it All Together: Writing Autonomous Bots
-
Chapter 12: Staying Hidden
- Prominent Anti-Cheat Software
- The PunkBuster Toolkit
- The ESEA Anti-Cheat Toolkit
- The VAC Toolkit
- The GameGuard Toolkit
- The Warden Toolkit
- Carefully Managing a Bot’s Footprint
- Defeating Signature-Based Detection
- Defeating Screenshots
- Defeating Binary Validation
- Defeating an Anti-Cheat Rootkit
- Defeating Heuristics
- Closing Thoughts
- Index
- Footnotes
- Resources
- Get Inside the Game
Product information
- Title: Game Hacking
- Author(s):
- Release date: July 2016
- Publisher(s): No Starch Press
- ISBN: 9781593276690
You might also like
book
Hands on Hacking
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the …
book
The Hardware Hacking Handbook
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object …
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …
book
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource …