Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Windows lets you configure guard pages where you get notified on access, normally used to detect stack growth and such. Although that should be an easy and normal thing to avoid for av/cheats.

https://learn.microsoft.com/en-us/windows/win32/memory/creat...



I wonder if this can be circumvented by running Dota in a VM.


Not helping as long as the page fault is triggered and handled by the process. You could just not do a regular read of the page though. No need for a VM for that, just call VirtualQueryEx and check MEMORY_BASIC_INFORMATION.AllocationProtect for the PAGE_GUARD flag.


It could be bypassed by running the cheat outside the VM.

Of course, there's plenty of detection techniques for VMs too.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: