My Book Review of "Game Hacking"
"Game Hacking: Developing Autonomous Bots for Online Games" by Nick Cano is an incredible, technical computer-security book.
This book is an awesome confluence of computer science, computer security, and game design, illustrating a variety of technical topics from each domain for the reader and how to manipulate those to your advantage.
"Game Hacking" makes for both a great read straight through or as a desk reference when reversing games or abusing Windows process memory. I give the book 9 out of 10 stars, as probably one of the best technical computer security books I have read in awhile.
I'de recommend this book for anyone into security, computer science, or even game development, and especially those into game hacking. I'de further recommend it for all skill levels, whether its basics like the x86 primer, more advanced techniques like process injection, or even more advanced game hacks like writing headless network clients.
The book moves from using tools of the game hacking trade and advanced debugging techniques, all the way to re-implementing and writing your own tools and bots. It's truly an excellent technical security book that arms readers with a variety of tools to take their game hacking to the next level.
Check out the table of contents as follows:
Introduction
PART 1: TOOLS OF THE TRADE
Chapter 1: Scanning Memory Using Cheat Engine
Chapter 2: Debugging Games with OllyDbg
Chapter 3: Reconnaissance with Process Monitor and Process Explorer
PART 2: GAME DISSECTION
Chapter 4: From Code to Memory: A General Primer
Chapter 5: Advanced Memory Forensics
Chapter 6: Reading from and Writing to Game Memory
PART 3: PROCESS PUPPETEERING
Chapter 7: Code Injection
Chapter 8: Manipulating Control Flow in a Game
PART 4: CREATING BOTS
Chapter 9: Using Extrasensory Perception to Ward Off Fog of War
Chapter 10: Responsive Hacks
Chapter 11: Putting It All Together: Writing Autonomous Bots
Chapter 12: Staying Hidden
PART 1: TOOLS OF THE TRADE
Chapter 1: Scanning Memory Using Cheat Engine
Chapter 2: Debugging Games with OllyDbg
Chapter 3: Reconnaissance with Process Monitor and Process Explorer
PART 2: GAME DISSECTION
Chapter 4: From Code to Memory: A General Primer
Chapter 5: Advanced Memory Forensics
Chapter 6: Reading from and Writing to Game Memory
PART 3: PROCESS PUPPETEERING
Chapter 7: Code Injection
Chapter 8: Manipulating Control Flow in a Game
PART 4: CREATING BOTS
Chapter 9: Using Extrasensory Perception to Ward Off Fog of War
Chapter 10: Responsive Hacks
Chapter 11: Putting It All Together: Writing Autonomous Bots
Chapter 12: Staying Hidden


No comments:
Post a Comment
Note: only a member of this blog may post a comment.