técnicas de engenharia reversa e manipulação de memória: uma abordagem prática em jogos digitais
Data
Orientado(es)
Título da Revista
ISSN da Revista
Título de Volume
Editor
Abstract
This study investigates reverse engineering and memory manipulation techniques applied to digital games, aiming to demonstrate these processes in practice. A theoretical review of reverse engineering is presented, covering methods of static and dynamic analysis, as well as the use of tools such as binary disassemblers, debuggers, and the Cheat Engine software. Memory manipulation is used to read and modify critical variables during the execution of the game. To validate the presented concepts, a proof of concept was developed using the open-source game Assault Cube, selected for its accessibility and lack of protection mechanisms. With the support of the Memory.dll library and the .NET framework using the C\# language, a tool was created capable of reading and modifying variables such as health points, ammunition, and the player’s grenade count. Among the implemented features, the visualization of enemy positions through walls (ESP), aim assistance (aimbot), and continuous updating of player attributes stand out. The results demonstrate the feasibility of applying reverse engineering techniques to map internal structures and manipulate variables in real time, even without access to the game's source code. It is observed, however, that the absence of anti-cheat systems facilitated the process, which limits the generalization of the results to protected commercial games. It is concluded that mastering these techniques enhances the understanding of the internal functioning of digital games and encourages the development of software analysis skills.
