Practical video game bots : automating game processes using C++, Python, and AutoIt /: automating game processes using C++, Python, and AutoIt. (2018)
- Record Type:
- Book
- Title:
- Practical video game bots : automating game processes using C++, Python, and AutoIt /: automating game processes using C++, Python, and AutoIt. (2018)
- Main Title:
- Practical video game bots : automating game processes using C++, Python, and AutoIt
- Further Information:
- Note: Ilya Shpigor.
- Authors:
- Shpigor, Ilya
- Contents:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Preface; Introduction; Chapter 1: Overview of Bots; Purpose of Bots; Game Application; Types of Bots; Community Classification; Developer Classification; Bot Comparison; Summary; Chapter 2: Clicker Bots; Developer Tools; Programming Language; Image Processing Libraries; Image Analysis Tool; Source Code Editors; API Hooking; OS-Level Data Embedding; Keystroke Simulation; Keystroke in Active Window; AutoIt Send Function Internals; Keystroke in Inactive Window; Mouse Simulation Mouse Actions in Active WindowMouse Actions in Inactive Window; OS-Level Data Embedding Summary; Output Device Capture; Windows Graphics Device Interface; AutoIt Analysis Functions; Analysis of Specific Pixel; Analysis of Pixels Changing; Advanced Image Analysis Libraries; FastFind Library; ImageSearch Library; Capturing Output Device Summary; Example with Lineage 2; Lineage 2 Overview; Bot Implementation; The Blind Bot; The Bot with Conditions; Further Improvements; Lineage 2 Summary; Protection Approaches; Test Application; Analysis of Actions; Process Scanner; Keyboard State Check Protection SummaryChapter 3: In-game Bots; Tools; Programming Language; Debugger; Memory Analyzing Tools; Process Memory Analysis; Process Memory Overview; Variable Searching; 32-Bit Application Analysis; 64-Bit Application Analysis; Process Memory Analysis Summary; Process Memory Access; Open Process; Read and Write Operations; TEBIntro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Preface; Introduction; Chapter 1: Overview of Bots; Purpose of Bots; Game Application; Types of Bots; Community Classification; Developer Classification; Bot Comparison; Summary; Chapter 2: Clicker Bots; Developer Tools; Programming Language; Image Processing Libraries; Image Analysis Tool; Source Code Editors; API Hooking; OS-Level Data Embedding; Keystroke Simulation; Keystroke in Active Window; AutoIt Send Function Internals; Keystroke in Inactive Window; Mouse Simulation Mouse Actions in Active WindowMouse Actions in Inactive Window; OS-Level Data Embedding Summary; Output Device Capture; Windows Graphics Device Interface; AutoIt Analysis Functions; Analysis of Specific Pixel; Analysis of Pixels Changing; Advanced Image Analysis Libraries; FastFind Library; ImageSearch Library; Capturing Output Device Summary; Example with Lineage 2; Lineage 2 Overview; Bot Implementation; The Blind Bot; The Bot with Conditions; Further Improvements; Lineage 2 Summary; Protection Approaches; Test Application; Analysis of Actions; Process Scanner; Keyboard State Check Protection SummaryChapter 3: In-game Bots; Tools; Programming Language; Debugger; Memory Analyzing Tools; Process Memory Analysis; Process Memory Overview; Variable Searching; 32-Bit Application Analysis; 64-Bit Application Analysis; Process Memory Analysis Summary; Process Memory Access; Open Process; Read and Write Operations; TEB and PEB Access; Current Process; Target Process; Heap Access; Process Memory Access Summary; Example with Diablo 2; Bot Overview; Diablo 2 Memory Analysis; Search the Parameters; Search the Object; Bot Implementation; Further Improvements; Example Summary Protection ApproachesTest Application; Analysis of Test Application; The Bot for Test Application; Approaches Against Analysis; WinAPI for Debugger Detection; IsDebuggerPresent; CloseHandle; CreateProcess; Register Manipulations for Debugger Detection; Approaches Against Bots; Hiding Game Data; XOR Cipher; AES Cipher; Check Correctness of Game Data; Protection Approaches Summary; Chapter 4: Out-game Bots; Tools; Programming Language; Network Analyzer; Windows Configuration; Internet Protocols; Communication Tasks; TCP/IP Stack; Packet Analysis; Test Application; Packet Capture; UDP Connection Example with NetChessBot Overview; NetChess Traffic Analysis; Bot Implementation; Assessing the Bot; Protection Approaches; Cryptographic System; Test Application; XOR Cipher; Triple DES Cipher; AES Cipher; RSA Cipher; Detecting Out-game Bots; Chapter 5: Extra Techniques; Input Device Emulation; Input Device Emulation Tools; Keyboard Emulation; Keyboard Modifiers; Mouse Emulation; Keyboard and Mouse Emulation; Input Device Emulation Summary; OS-Level Interception Data; OS-Level Interception Data Tools; Test Application; DLL Import; API Hooking Techniques; Proxy DLL; Example of Proxy DLL … (more)
- Publisher Details:
- Place of publication not identified : Apress
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 629.892
Computer science
Video games -- Automation
Robots -- Programming
C++ (Computer program language)
Python (Computer program language)
TECHNOLOGY & ENGINEERING / Engineering (General)
C++ (Computer program language)
Python (Computer program language)
Robots -- Programming
Computers -- Programming Languages -- General
Computers -- Programming Languages -- Python
Computers -- Programming -- Microsoft Programming
Programming & scripting languages: general
Microsoft programming
Python (Computer program language)
Microsoft software
Microsoft .NET Framework
Computers -- Programming -- Games
Games development & programming
Electronic books - Languages:
- English
- ISBNs:
- 9781484237366
1484237366 - Related ISBNs:
- 9781484237359
1484237358 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed August 28, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.368965
- Ingest File:
- 01_349.xml