SYSTEMFILES

@SYSTEMFILES

Joined on Feb 1, 2022

  • Silvester 23 Statusbericht. Es ist einiges passiert, doch viel getan hat sich nicht. Während die Welt feiert und vor Freude tanzt Bring ich euch kurz auf den neusten Stand. :::danger :warning: Triggerwarnung: Der folgene Statusbericht beinhaltet dinge wie Suizid, Mobbing, Tod, Diskriminierung daher bitte nur lesen wenn du dazu in der verfassung bist!:warning: ::: Ich habe den Bericht in diesem Jahr etwas kürzer gehalten, da ich nicht alle Informationen zu bestimmten sachen preisgeben möchte. Dennoch denke ich, dass es für einen kleinen Überblick ausreichend sein sollte. Telefonseelsorge :::spoiler 0800 111 0 111 oder 0800 111 0 222
     Like  Bookmark
  • Discord für 13 Euro 1. was du brauchst Google Pay (falls du IOS nutz einfach Bluestacks aufm PC) Kreditkarte (virtuelle gehen auch Revolut,Klarna Card) 2. how to erstelle dir ein neues Google Konto. gehe hier hin https://pay.google.com/gp/w/u/1/home/paymentmethods Füge eine neue Zahlungsmethode hinzu. Gebe dein Namen ein (Wichtig: Du musst dein echten Namen nutzen welcher auf bei der Kredikarte angeben ist!)
     Like  Bookmark
  • Alles ist eher für ein Aggresiven Playstyle ausgelegt, daher werdet ihr meist das Red dot finden. FAL - RANK 140 Visier: Red Dot Lauf: Flash hider oder Long Barrel (Long Barrel killt mit 3 schuss hat aber ein hohen recoil) Griff: B-25 U R K Seiten Rail: Laser (ist kein muss) Magazin: Quick A Mag (Achtung recoil wird mehr, ist kein muss)
     Like  Bookmark
  • Grundsätzlich gibt es 4 Möglichkeiten den Gamepass Ultimate günstiger zu bekommen: jeden Monat einen nicht stapelbaren GPU Key einlösen (nervig, aber günstig) circa 4-8€/Monat ist aufwendig und Keys können ablaufen. Außerdem sind die deutlich teurer geworden (Preis initial waren unter 1€!) Gold-Trick ohne VPN circa 5€/Monat (Ich sehe keinen Grund dies zu machen, weil VPN kann mit dieser bebilderten Schritt für Schritt Anleitung wirklich jeder. Es ist nicht illegal (vers. Anwälte). Man benötigt circa 3 Minuten eine ausländische IP, das wars. Es geht seit Jahren bei mehreren Hunderten von Usern. Gold-Trick mit VPN circa 3,20€/Monat. Das ist für Leute die bis zu 2 Jahre Ruhe haben wollen und mit unter 40€/Jahr okay sind. Hierzu die Anleitung unten. Direkt in der Türkei abonnieren (nur mit türk. KK, mittlerweile auch teurer geworden siehe Deal). Den Gold-Trick gibt's tatsächlich schon seit Jahren. 2019 im Xbox Blog von MS selbst veröffentlicht. Ist also eher ein Dauerangebot. DLDR/Prinzip ist: Kaufe 1 bis 3 Jahre Gold (günstigstes Abo von MS). Kaufe danach 1 GPU Key/1€ Neukunden-Angebot und upgrade so die komplette Zeit in einen GPU (im Verhältnis 3:2). So hat man bis zu 2 Jahre/25 Monate seine Ruhe. Und auch die Sicherheit, dass in der Zeit MS das Abo nicht beenden kann. Günstiges Gold-Guthaben bekommt man i.d.R. im Ausland (Türkei, Brasilien,...) ist egal wo. Das Guthaben kann ohne Probleme auf ein dt. Konto eingelöst werden! Region bitte NIE wechseln! Lieber einen 2. Account erstellen im Ausland, falls man Spiele zB mit USD im US Store kaufen möchte.
     Like  Bookmark
  • Gamepass auf dem FireTV erstmal müssen wir die Dev optionen freischalten das geht ganz einfach: Navigiere auf dem Startbildschirm des Fire TV zu den Einstellungen. Öffnet hier das Untermenü in der Liste Mein Fire TV. Wechseln in das Untermenü Info. Markiere nun den Namen des Gerätes und drücke wiederholt auf die Schaltfläche Auswählen. Nach sieben Klicks erhälst du die Bestätigung, dass die Entwickleroptionen aktiviert sind. Unbekannten APK Download erlauben
     Like  Bookmark
  • Image integrity checks BattlEye does checks on images that get loaded by opening a handle to the file on disk with CreateFile, after this handle’s open, it retrieves certificate details for the file, and checks if it’s one of the blacklisted certificates. If it is, the file gets blocked from loading and BattlEye notifies you that a blacklisted file was attempting load. In the section below, we’ll talk about how to implement a work around for this. Implementation Contrary to the what they do for other functions, they don’t do any integrity checks on CreateFile, and when you start any protected game, BEService (BattlEye’s user-mode component) stays unprotected until the game’s fully initialized, and no memory integrity checks are in place during this period either, so we can just hook it without any tricks. Based on the information I talked about in the section above, we can fool BattlEye into believing that it’s opening a handle to an official Microsoft certified file, and we get straight through their certification checks.
     Like  Bookmark
  • Why anti-cheats block overclocking tools Overview This is a brief informational piece for the readers that don’t come from a deep technical background regarding cheats/anti-cheats/drivers or related. It’s come to our attention that many people are wondering why certain anti-cheats block or log when a player has overclocking/tuning software open. I’ll start off by explaining why these types of software require drivers, then show a few examples of why they’re dangerous and provide information about the dangerous recycling of code that makes the end-user vulnerable. Recycling code out of convenience at the risk of your end-users is a lazy decision that can result in damage to your system. In this case, the code is recycled from sites like kernelmode.info, OSR Online, and so on. The drivers that are used by this software are particularly problematic and would be the first targets I’d look for if I was looking to exploit a large population of people - gamers and tech enthusiasts would be a good crowd because of the tools presented below. This is by no means an exhaustive list, I’m only addressing a few drivers that are/have been exploited in cheating communities. There are dozens if not hundreds in the wild. Let’s cover the reasoning for a driver with these types of software. Notice: We are not affiliated with game publishers or anti-cheat vendors, paid or otherwise. Driver Requirements Hardware monitoring/overclocking tools have been rising in popularity in the last half-decade with the growth in professional gaming, and technical requirements to run certain games. These tools query various system components like GPU, CPU, thermal sensors, and so on, however, this information isn’t easily acquired by a user. For example, to query the on-die digital temperature sensor to get temperature data for the CPU an application would need to perform a read on a model-specific register. These model-specific registers and the intrinsics to read/write them are only available when operating at a higher privilege level such as ring-0 (where drivers operate.) A model-specific register (MSR) is a type of register that is part of the x86 instruction set. As the name suggests, some registers are present on certain processors while others are not - making them model-specific. They’re primarily used for storing platform specific information, and CPU feature information; they can also be used in performance monitoring or thermal sensor monitoring. Intel decided to provide two instructions in the x86 ISA that allowed for privileged software (operating system or otherwise) to read or write model-specific registers. The instructions are rdmsr and wrmsr, and allow a privileged actor to modify or query the state of one of these registers. There is an extensive list of MSRs that are available for Intel and AMD processors that can be found in their respective SDM/APM. The significance of this is that much of the information in these MSRs should not be modified by any tasks privileged or not. There is rarely a need to do so even when writing device drivers. Many drivers for hardware monitoring software allow an unprivileged task (in terms of privilege level, excluding Admin requirements) to read/write arbitrary MSRs. How does that work? Well, the drivers must have a mode of communication available so that they can read privileged data from an unprivileged application, and these drivers provide that interface. It’s important to reiterate that the majority of hardware monitoring/overclocking drivers that come packaged with the client application have much more, albeit unnecessary, functionality available through this communication protocol. The client application, let’s say the CPUZ desktop application, uses a Windows API function named DeviceIoControl. In the simplest sense, CPUZ calls DeviceIoControl with an IO control code that is known to the developers to perform a read of an MSR like the on-die digital temperature sensor. This isn’t an inherently dangerous thing. What’s problematic is that these drivers implement additional functionality that is outside the scope of the software and expose it through this same interface - like writing to MSRs, or physical memory.
     Like 1 Bookmark
  • BattlEye anti-cheat: analysis and mitigation BattlEye is a prevalent german third-party anti-cheat primarily developed by the 32-year-old founder Bastian Heiko Suter. It provides game publishers easy-to-use anti-cheat solutions, using generic protection mechanisms and game-specific detections to provide optimal security, or at least tries to. As their website states, they are always staying on top of state-of-the-art technologies and utilizing innovative methods of protection and detection, evidently due to their nationality: QUALITY MADE IN GERMANY. BattlEye consists of multiple organs that work together to catch and prevent cheaters in the respective games that pay them. The four main entities are: BEService - Windows system service that communicates with the BattlEye server BEServer, which provides BEDaisy and BEClient server-client-communication capabilities. BEDaisy - Windows kernel driver that registers preventive callbacks and minifilters to prevent cheaters from modifying the game illicitly. BEClient - Windows dynamic link library that is responsible for most of the detection vectors, including the ones in this article. It is mapped into the game process after initialization. BEServer - Proprietary backend-server that is responsible for collecting information and taking concrete actions against cheaters. Shellcode Recently, a dump of BattlEye’s shellcode surfaced on the internet, and we decided to make a write-up of what exactly the current iteration of BattlEye is actively looking for. We have not worked on BattlEye for the past 6 months, so the last piece of shellcode we have dumped is most likely obsolete. Miscellaneous parts of code were recognized completely from memory in this recent dump, suggesting that BattlEye only appends to the shellcode and does not remove previous detection procedures.
     Like 2 Bookmark
  • BitLocker is a modern data protection feature that is deeply integrated in the Windows kernel. It is used by many corporations as a means of protecting company secrets in case of theft. Microsoft recommends that you have a Trusted Platform Module which can do some of the heavy cryptographic lifting for you. Bypassing BitLocker in 6 easy steps Given a Windows 10 system without known passwords and a BitLocker-protected hard drive, an administrator account could be adding by doing the following: At the sign-in screen, select “I have forgotten my password.” Bypass the lock and enable autoplay of removable drives. Insert a USB stick with my .exe and a junction folder. Run executable. Remove the thumb drive and put it back in again, go to the main screen.
     Like  Bookmark