• Stars
    star
    551
  • Rank 80,726 (Top 2 %)
  • Language
    C++
  • Created over 5 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

ROP based CSGO, BF3, BF4 cheat

ROP-COMPILER

ROP based CSGO, BF3, BF4 cheat

What is ROP

The Wikipedia article about it describes it best:

Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as executable space protection and code signing.[1]

In this technique, an attacker gains control of the call stack to hijack program control flow and then executes carefully chosen machine instruction sequences that are already present in the machine's memory, called "gadgets".[2] Each gadget typically ends in a return instruction and is located in a subroutine within the existing program and/or shared library code. Chained together, these gadgets allow an attacker to perform arbitrary operations on a machine employing defenses that thwart simpler attacks.

https://en.wikipedia.org/wiki/Return-oriented_programming

The TL;DR is that return-oriented programming (ROP) is a commonly used technique in exploitation to gain code execution

look below at Compiler output

Why ROP

CSGO is protected by Valve Anti-Cheat (short VAC)
BF3 and BF4 are protected by PunkBuster (short PB)
ROP should be very difficult to detect for these Anti-Cheats for the following reasons

  • The cheats program code consists of a list of volatile memory addresses that change with each game and computer restart
  • Afaik VAC prefers to analyze memory pages that are marked as executable but for ROP the list of return-addresses doesn't require to be on an executable memory page.
  • Additionally the ROP-Compiler supports the option of inserting random padding into the ROP-chain.

So hopefully this cheat will be VAC / PB undetected for ever πŸ˜‰

ROP-Code

You can download a compiled binary of the Rop-Compiler from here:
DOWNLOAD BUTTON

For a look into the compiled code look below at Compiler output

Compiler

Data-types

In computer science a Words size is determined by the maximal number of bits the processor can process
But Intel and Microsoft define a word as a 16bit number:

Bits Bytes Datatype name
16 2 WORD
32 4 DWORD
64 8 QWORD
64 8 DWORD64

For all data-types check microsofts documentation:
https://docs.microsoft.com/en-us/windows/win32/winprog/windows-data-types

Accessible registers

Native x86 registers

  • EAX => ( Initialized to GLOBAL_MinimumAddress )
  • ECX
  • EDX
  • EBX ( is also used by the compiler for jumps and writing to virtual registers )

added virtual registers

  • VR0 => ( Initialized to GLOBAL_MinimumAddress )
  • VR1 => ( Initialized to random number )
  • VR2 => ( Initialized to random number )
  • VR3 => ( Initialized to OFFSET_bSpotted )
  • VR4 => ( Initialized to OFFSET_TeamNum )
  • VR5 => ( Initialized to OFFSET_CrosshairId )
  • VR6 => ( Initialized to OFFSET_FORCE_ATTACK )
  • VR7 => ( Initialized to OFFSET_EntityList )
  • VR8 => ( Initialized to OFFSET_LocalPlayer )
  • VR9 => ( Initialized to OFFSET_GlowObjectManager )

Read only register

  • VMM => ( Initialized to the address of a 8192 Byte Read/Write memory page )

Usable instructions

The instruction set is very limited and can be found in the >>Gadgets.h<< header

Compare two values

it's very rare to find a comparison instruction followed by a return, so I am using a trick:

;//if ( ECX != 0x28 ) goto l_skip
mov eax, 0x28
sub eax, ecx;//COMPARE EAX, ECX
jne l_skip

a substraction in x86 also effects the flags.
so for example:

mov eax, 0x1
mov ecx, 0x1
sub eax, ecx

the ZeroFlag will be set to 1 by the substraction instruction.

Special instructions

Jump labels

@l_LabelName:

Get address of jump label

mov ebx, @l_LabelName

Get address of Gadget

mov ebx, #xchg esp,ebx

Get address of API function

mov ebx, !user32.GetAsyncKeyState

Reading from Virtual Registers

mov ecx, VR8

the compiler will translate it to (each line a single gadget)

xchg eax, ecx
pop eax ;//load virtual register address from stack
mov eax, DWORD PTR[eax]
xchg eax, ecx

Writing to Virtual Registers

mov VR8, ecx

note that ebx can't be written directly to a virtual register

the compiler will translate it to (each line a single gadget)

xchg eax, ecx
pop ebx ;//load virtual register address from stack
mov DWORD PTR[ebx], eax
xchg eax, ecx

Jumps

jne l_Start

note that a jump overwrites the ebx register!
look at the function addJumpToRopChain but basically its using a conditional move

mov ebx, @l_Start
cmovne esp,ebx

only that a conditional move directly to esp is very rare so it's utilizing exchange instructions to be able to use a more commonly used instruction like this:

mov ebx, @l_Start
xchg ecx, ebx
mov eax, @l_continue543
cmovne eax,ecx
xchg ecx, ebx
xchg eax, ebp
@l_continue543:

Compiler functions

Execution order Function Description
1. LoadFileToMemory loads the raw assembly source-code file into memory
2. GetCompilerSettings searches for the compiler settings
3. InitializeRopGadgets depending on the compiler settings gadgets specified in the "Gadgets.h" header get searched
4. BringYourOwnGadgets the gadgets that didn't get found get placed into a with random data-filled buffer
5. CompileCode calls the four functions below
6. => ReadInCode the instructions get extracted from the source-code file and stored in the InstructionCache struct
7. => ConvertToROP builds the ROP-chain by retrieving the address of each instruction and adding it to the RopChain vector
8. => HijackThreadStack creates a new thread with CreateRemoteThread and overwrites the threads stack with the Rop-chain at a random position in the stack
9. ==> RelocatingJumps relocates all jump addresses to the address of the rop-chain in memory
10. RemoveUnusedGadgets removes not used gadgets from the gadget buffer created by the BringYourOwnGadgets function
11. ResumeThread starts the execution of the rop-chain

Compiler output

using the tool ReClass you can look inspect memory and look at the generated rop-chain

Raw thread stack

This is how the generated thread-stack (ROP-Chain) looks like:

Image of rop-chain

Thread stack with gadget code

Now on the right I added the assembler code that is at each address:

Image of rop-chain

Reclass

For a Tutorial on ReClass look at UC
https://www.unknowncheats.me/forum/general-programming-and-reversing/120805-reclass-usuage-reclass-and-its-content.html

ret instruction

the return instruction is essential for ROP.
The CPU jumps ( by setting the InstructionPointer [on x86 EIP] ) to an address it reads from the stack
to help understanding the instruction this how the CPU processes the ret instruction:

void Ret( )
{
	Eip = *(DWORD*)( Esp + 0x000000 );
	Esp = Esp + 4;
}

pop instruction

gadgets for pop instructions are easy to find and can be used to set a register to a certain value
to help understanding the instruction this how the CPU processes the pop eax instruction:

void PopEAX( )
{
	Eax = *(DWORD*)( Esp + 0x000000 );
	Esp = Esp + 4;
	Eip = Eip + 1;
}

jumps in ROP

in ROP the stack pointer ESP becomes the instruction pointer so by changing it follwed by a return instruction a jump happens
to do conditional jumps a conditional move instruction can be used:

//Unsigned Conditional Jump
//  JE - JZ   - Equal/zero                  - ZF = 1
if ( memcmp( C, "je", 2 ) == 0 || memcmp( C, "jz", 2 ) == 0 )
{
	//"cmove esp,ebx"
	addJumpToRopChain( p, C, 2, "cmove" );
	continue;	
}

for unconditional jumps a pop esp or a xchg esp, ebx can be used

Conditional jump instructions: [page: 184]
https://software.intel.com/sites/default/files/managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf#G9.1746

Conditional Move Instructions: [page: 172]
https://software.intel.com/sites/default/files/managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf#G9.17648

More Repositories

1

Custom-GetProcAddress-and-GetModuleHandle-and-more

Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions
C++
81
star
2

ManualMapped_SEH_32bit

Enable SEH support for manual mapped x86-32bit PEs
C++
65
star
3

BFV-Decryption

BFV Decryption Demo
C++
57
star
4

BFV-SimpleCheat

Simple bfv internal cheat
C++
46
star
5

NsiAllocateAndGetTable-used-from-GetTcpTableInternal

Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64
Assembly
18
star
6

RuntimeInstaller

Microsoft Redistributable Download & Installer
C++
17
star
7

CPUID

MSVC CPU Information struct
C++
13
star
8

BFV-ExternalEntityIterator

tool that helps to search for iterable entities in bfv
C++
9
star
9

BFV-OcclusionQueryManager

BFV OcclusionQueryManager reversed
C
9
star
10

FileToHex

Creates a c++ byte array from a file
C++
7
star
11

HookImportTable

Detours an entry of the import table in memory
C++
6
star
12

ElevateProcess

Elevate a process after it started
C++
5
star
13

HookExportTable

Detours the export entry from the export table in memory
C++
5
star
14

DriveSizeSpoofer

*APRIL FOOL* Allows you to increase the capacity of your drives
C++
5
star
15

Frostbite-BugSentryContextData

Traversing frostbites BugSentry->StringContextData
C++
4
star
16

MineSweeperCheat

Minesweeper external cheat
C++
2
star
17

Drawing3dSphere

Drawing a 3D Sphere in C++
C++
2
star
18

MatrixFun

Inversion of matrix and multiplication with a vector in C++
C++
2
star
19

Pong

Basic cmd based pong game
C++
1
star
20

__uint128

unsigned 128Bit Integer
C++
1
star
21

Tic-tac-toe

Simple Tic-tac-toe game
C++
1
star