![]() People here posted "this got patched", as in "this is now detected by Nprotect".Īs for Nprotect itself, it prevents hacking by loading a special module via "dll injection" onto ANY program's memory, blocking or changing some kernel-based memory/debugging functions like ReadProcessMemory, so they specifically return error codes or invalid read-ups, if the "target" is the game's name. So this shows the program is rather weak also considering the fact that these 12-15 year old kids are messing around with nprotect which is made by older people.Īs far as I can understand, the aimbot people are discussing seems to read the memory and work with it, rather than reading packages. Then you created your own webserver for the nprotect files and basically tricking the nprotect program into thinking it updated to the newest version and it was all good but you were actually using its oldest files from when it was first released and you could use old hacks or bypass it alot easier then normally. Nprotect used to be bypassed by doind another method where u installed IIS on your PC. basically what i think is it looks for PG's self protection and sees if its active or goes through the registry to see if PG is installed. so someone thought hmm if i inject these 2 dlls then use process guard to protect my explorer.exe from nprotect then it wouldnt restart and things would be ok. but then it was patched and this time after u injected then started gunbound, nprotect would restart your explorer.exe and your injection was then useless. what u did was inject 2 dll files into explorer.exe and when u opened gunbound you could use tools for memory editing and aimbot. there was a bypass for nprotect and it was patched by nprotect. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |