Skip to content

Just another pasted menu based on Nano42, use public auth method like glitch auth, and protect that using cracked version of Themida.

Notifications You must be signed in to change notification settings

InsideExploit/eternitymenu-module

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

EternityMenu-VIP Self Bypass

Just an reversed module of an mod menu of Grand Theft Auto V protected using Themida and an Auth based on glitch: https://support.glitch.com/t/how-to-create-your-own-auth-system-with-glitch-and-c-for-your-desktop-app/7196

Requirements

  • HTTP Debugger Pro
  • IDA Pro 7.2
  • The DLL of the menu
  • Injector
  • Scylla Dumper
  • Cheat Engine

Module Link: https://eternitymenu.com/menu/ | That is the official repository with the auth php file and with the image files and something other bullshits.

How to bypass

  1. First inject the module DLL in GTA5.exe using Xenos or some other injectors.
  2. After open Cheat Engine, attach GTA5.exe processes, and select module desiderated.
  3. Now if you did all steps, open Scylla Dumper, select GTA5.exe process and pick the module desiderated and dump it.
  4. Import that module into IDA Pro 7.2, and go check the correct response code for the failed check.

Step Number 4

  1. Now find the correct response value using strings and checking the asm code.

Step Number 5

  1. Now go check where is going to call the website auth url, so the url of website like here.

Step Number 6

  1. Now its the time to open the network debugger, now i will use HTTP Debugger Pro, remember to use SSL Certificates for grabbing requests.
  2. Now lets find the request with the URL we found before using IDA Pro 7.2, so the request is going to do is connected to the domain "x.com/auth?parameter1=username&parameter2=password&parameter3=hwid. Something like that. (UPDATE OF 26/11/2020: Now the request are on the path /fag/!)"

Step Number 8

  1. Now if we go to the raw text of the response content we will see our response and on request we can see the parameters like in the url.

Step Number 9

  1. Now we need rendirect that request and rendirect the response to 127.0.0.1 and modify the response content to the response we found in ida so that is "authorised" (UPDATE OF 26/11/2020: from "authorised" is now "successvip").

Here we are going to change our request and set the response to the valid one so like i've buyed VIP. You must change the url paramters with the username and password you want to use in login, you can do it random one.

Step Number 10

  1. After enabling the rule up ^, you just need go in game and use the credentials you used in the parameters of autoreply URL.
  2. Enjoy that is all, if you want some proof about that, check under here.

HERE PROOFS: https://imgur.com/a/PQyxuV6

About

Just another pasted menu based on Nano42, use public auth method like glitch auth, and protect that using cracked version of Themida.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published