Jimmyfenix
Member
"We're also rolling out an updated anti-crack solution (note: not DRM) that prevents certain users from hacking the executable," Capcom wrote.
"The solution also prevents memory address hack that are commonly used for cheating and illicitly obtaining in-game currency and other entitlements that haven't been purchased yet," that added.
This fix intends to prevent the offline version of Street Fighter 5 from being hacked with a new 'handshake' feature.
"The anti-crack solution does not require online connectivity in order to play the game in offline mode; however, players will be required to click-confirm each time they boot up the game.
"This step allows 'handshake' to take place between the executable and the dependent driver prior to launch."
http://steamcommunity.com/games/310950/announcements/detail/832427843307776226
http://www.eventhubs.com/news/2016/sep/22/capcom-puts-anti-cracking-solution-place-street-fighter-5-hackers/
More info, courtesy of Cyborgmatt and Reddit user extrwi:
Since this driver is so small, it's also extremely easy to tell what it does. After taking a look, I would never let this product run on my machine.
The driver first registers itself using a pseudo-randomly generated name. That's kind of suspicious. It also doesn't specify any security, so any user at any privilege level can attempt to open and control the device. That's bad.
It sets up custom handlers for opening the device object, closing the device object, and performing ioctls on the device object. This is pretty normal, although a driver that didn't set up basic security when creating its device should perform security checks when opening the device. This driver does not.
The ioctl handler is where everything "interesting" happens. It checks for control codes 0xAA012044 and 0xAA013044, does some buffer size checks, disables data execution protection and then runs the arbitrary code passed in through the ioctl buffer with kernel permissions.
In short, this driver creates a back door which can allow a non-privileged user to run code with permissions of the kernel.
https://www.reddit.com/r/Games/comm...c_update_is_accessing_kernel_level_in/d7z4eev