K
K
kekwat12322022-03-26 07:56:45
Iron
kekwat1232, 2022-03-26 07:56:45

Methods to bypass hardware protection?

Good afternoon, the following conditions exist - There is a game that scans various hardware identifiers and determines whether the computer in front of it is unique or not. It also determines whether those identifiers are "plausible" or not.

Challenge: What approach should be taken to completely hide the fact that the game is installed a second time on the same computer as before.

Where can I find all iron identifiers? Or, say, are there any other ways than the obvious (i.e. changing all possible hardware identifiers) to bypass the game's protection?

I know that in android systems there is a wonderful tapjoy device id application that determines all possible ways to identify an android device. But for the computer, I did not find anything like that.



Plus, as far as I understand, there are no antifraud systems specifically for hardware (not to be confused with scanning ip or browser fingerprints)?

Answer the question

In order to leave comments, you need to log in

4 answer(s)
R
rPman, 2022-03-26
@rPman

some time ago, I remember installing the same online game twice (and more than one, with protections, didn’t break anything) on ​​a machine with aster (the ability to make two from one machine by connecting several monitors of keyboards and mice), installing games under different windows accounts
, which means you can run the same game on one monitor, running some kind of launcher with a shift under another user, at least far.
it all depends on the game and its protection.
if the protection is normal, then no sandbox will save you, otherwise, you can at least install a virtual machine if there is enough iron

P
pfg21, 2022-03-26
@pfg21

in addition to direct identifiers that can be directly replaced, there are hidden ones - the speed of the processor, the rendering speed of the video card, and the like.
this is harder to hide.
understand the work of getting a computer ID in the game and write a hack.
how costing try to raise the game in the virtual machine.

1
15432, 2022-03-26
@15432

There are only three main identifiers:
- model and serial number of the drive
- MAC address of the network card
- Board ID of the BIOS (usually the same for motherboards of the same model),
but I have met applications that also used
- SPD data from the RAM
- username
- set region and time zone
according to The idea is that in order to accurately bypass the game checks, you need to intercept all these requests and slip the left data, but this is quite laborious.
-

I
Inviz Custos, 2022-03-26
@MvcBox

Unfortunately (or fortunately, it depends on the chosen "side") system identification has not been made on the basis of hardware alone for a long time. At the moment, there is no universal solution that would allow deceiving all existing tools to compile a "fingerprint" of the system.
Almost always it comes down to one scenario:
- The reverse of the tool that makes up the print.
- Writing a solution specifically for this tool.
Therefore, you have only a few options:
- Reverse the protection yourself and write a "bypass" for it.
- Buy a solution (if any) under this protection.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question