Navigation
Search
|
Developer Hacks Denuvo DRM After Six Months of Detective Work and 2,000 Hooks
Friday April 5, 2024. 12:00 AM , from Slashdot
Once the Steam ticket is verified, a Denuovo Token is generated that only works on a PC with the exact fingerprint. This token is used to decrypt certain values when the game is running, enabling the system to run the game. In addition, the game will use the fingerprint to periodically verify security while the game is running, making Denuvo super difficult to hack. After six months, Heumann was able to figure out how to hijack Hogwart Legacy's Denuvo fingerprint and use it to run the game on another machine. He used the Qiling reverse engineering framework to identify most of the fingerprint triggers, which took him two months. There was a third trigger that he says he only discovered by accident. By the end, he was able to hack most of the Denuvo DRM with ~2,000 of his own patches and hooks, and get the game running on his laptop using the token generated from his desktop PC. Heumann ran a bunch of tests to determine if performance was impacted, but he wasn't able to get a definitive answer. 'He discovered that the amount of Denuvo code executed in-game is quite infrequent, with calls occurring once every few seconds, or during level loads,' reports Tom's Hardware. 'This suggests that Denuvo is not killing performance, contrary to popular belief.' Read more of this story at Slashdot.
https://games.slashdot.org/story/24/04/04/2045242/developer-hacks-denuvo-drm-after-six-months-of-det...
Related News |
25 sources
Current Date
May, Fri 3 - 01:33 CEST
|