
If you're a good enough programmer/net tech guy you can probably do without but it's still a great inspiration :) The best way to learn to hack games is to make your own in order to understand how it works. Of course, most modern games will have accounted for this, so it might not be the best example but should give you a general idea. You accept one of the quests and then inject your own forged packet data into the intercepted packet that sends 'this player clicked on 'accept' on the window of quest_999' instead of quest_10. Lets say you're a level 10 dwarf person and only have access to quests for that level.
client notifies player that quest has been startedĪs you see, injecting your own data into this could prove useful. server stores this data (player X is doing Y quest) and sends an acknowledgement back to the player telling the client that it may continue. player client sends a request to the server, saying 'this player clicked on 'accept' on the window of X quest'. This is the actual process that could be happening (or similar, or not, I don't know): Now, whilst this process seems straightforward, there is a lot of important stuff involved. The server then acknowledges this and allows the client to continue. When you accept a quest, what really happens is your client sends a event that you clicked 'accept' on a specific quest. A multiplayer game needs to handle these events between the client (player) and server. Play nice, support each other and encourage learning.ĭo you understand basic concepts of networking? If not this might be hard to follow.Ī game is based on a bunch of events. We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g. Offering to do these things will also result in a ban. Winject packet injection how to#
Asking how to get into your "girlfriend's" instagram. This is not the place to try to find hackers to do your dirty work and you will be banned for trying. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not Hacking can be a grey area but keep it above board. "TeenagerĪrrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering". Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!īans are handed out at moderator discretion.Īnother one got caught today, it's all over the papers. This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials any beginner questions should be directed there as they will result in a ban here. What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture.