SlideShare una empresa de Scribd logo
1 de 16
GAME CIH
The Ultimate Hacking Tool for Android OS
ABOUT GAME CIH
• Android GameCIH(CheatIng Hacker)
• This App was created by “Software Magician” in Taiwan
• The latest version of the app is 3.0.0 which started distribution from 2012/02/09
HOW IT WORKS
• This app actually accesses the memory locations and monitor all the changes.
• Since it monitors all the changes occurring in memory locations , Game CIH requires
ROOT Permissions in the android.
• There are practically millions of memory locations So the app needs to filter out the
changes to get a limited number of locations to be edited.
• Using this app, we can alter high scores, life of character, coins and money etc.
FULL TUTORIAL
• For this project I am using Game CIH 3 and The game to be hacked is “Subway
Surfers”- by Kiloo Games.
+ =
CIH ONLINE MODE
SIMPLE STEPS TO HACK A GAME
• Start the game.
• Play for a few seconds normally and pause your game after
checking your current score.
• Then click the search button in gamecih and search for
your current score.
• It will take 2-3 seconds to search and find the locations
containing the current scores.
• The number of results may vary according to your score
but usually we get 1-2 million results.
• Now resume your play and increase your score.
SIMPLE STEPS OF HACKING ANY GAME
• After you increased your score, jump back to
GameCIH and then search for the values that
increased using the plus (+) button.
• It will again give you enormous number of results.
• After you pressed the plus button you will get the
updated results.
• Again perform the previous steps and increase your
score and then search again.
• Keep performing the steps until you get limited
results which could be easily identified.
• Then search for your current score.
• To search you can use “Input Number” function
or manually scroll down.
AFTER YOU ACCESS YOUR SCORES…
• After you get your scores in the final list, tap on
that to edit it.
• Edit and increase the scores as much as you
can.
• You will rule the leader boards.
THUS YOUR GAME WILL BE HACKED
• After editing the score, come back to your game, this
time the score will be according to your wish.
• Note: Use lock button to lock your scores to
particular point otherwise the scores will be
overwritten by the game modules.
HACKED SCREENSHOTS
CONCLUSION
• Almost all games can be hacked by using GameCIH.
• It takes hardly 5 minutes to be on the top of the leaderboards.
• Users of this app are unbeatable because they control the flow of data.
DRAWBACKS
• The supreme requirement of this app is ROOT Access.
• The lite version is very slow because to edit a single address we have to wait for 5
seconds.
• Using this app sometimes crashes the game and Also corrupt the internal files of the
game.
PRESENTATION BY
• Harshvardhan Malpani
• Maharaja Agrasen Institute of Technology
• http://harsh.site88.net
• On Facebook
• Twitter
• My Fan Page

Más contenido relacionado

La actualidad más candente

GameSalad Weekend Intensive
GameSalad Weekend Intensive GameSalad Weekend Intensive
GameSalad Weekend Intensive Lynne Watanabe
 
Building the pipeline for FUN - Game Development
 Building the pipeline for FUN - Game Development Building the pipeline for FUN - Game Development
Building the pipeline for FUN - Game DevelopmentFaunaFace, Inc
 
Killer game-loops-case-magic-land final
Killer game-loops-case-magic-land finalKiller game-loops-case-magic-land final
Killer game-loops-case-magic-land finalWooga
 
Where the Whales live: the pyramid model of F2P design
Where the Whales live: the pyramid model of F2P designWhere the Whales live: the pyramid model of F2P design
Where the Whales live: the pyramid model of F2P designNicholas Lovell
 
Presentazione ThumbleCrash - last version
Presentazione ThumbleCrash - last versionPresentazione ThumbleCrash - last version
Presentazione ThumbleCrash - last versionSB Soft
 
Lost John - Mobile Game Development
Lost John - Mobile Game DevelopmentLost John - Mobile Game Development
Lost John - Mobile Game DevelopmentAntonio Cesarano
 
Digital destroyers davis_jonathon_controller design_0415
Digital destroyers davis_jonathon_controller design_0415Digital destroyers davis_jonathon_controller design_0415
Digital destroyers davis_jonathon_controller design_0415DavisDesigns
 
Turn complex to epic - Zelda goals planning
Turn complex to epic - Zelda goals planningTurn complex to epic - Zelda goals planning
Turn complex to epic - Zelda goals planningAlexandre Quach
 
Steam: the latest trends and insights for developers
Steam: the latest trends and insights for developersSteam: the latest trends and insights for developers
Steam: the latest trends and insights for developersDevGAMM Conference
 
Game Biz-Dev Party (GBDPxSEOUL) 2012
Game Biz-Dev Party (GBDPxSEOUL) 2012Game Biz-Dev Party (GBDPxSEOUL) 2012
Game Biz-Dev Party (GBDPxSEOUL) 2012GAMENEXT Works
 
Activate all angry birds
Activate all angry birdsActivate all angry birds
Activate all angry birdsDephi Vanhoten
 
The story of_making_raimy
The story of_making_raimyThe story of_making_raimy
The story of_making_raimycocominap
 

La actualidad más candente (17)

GameSalad Weekend Intensive
GameSalad Weekend Intensive GameSalad Weekend Intensive
GameSalad Weekend Intensive
 
Non stop company-intro
Non stop company-introNon stop company-intro
Non stop company-intro
 
Google Home
Google HomeGoogle Home
Google Home
 
Building the pipeline for FUN - Game Development
 Building the pipeline for FUN - Game Development Building the pipeline for FUN - Game Development
Building the pipeline for FUN - Game Development
 
Interpreter
InterpreterInterpreter
Interpreter
 
Killer game-loops-case-magic-land final
Killer game-loops-case-magic-land finalKiller game-loops-case-magic-land final
Killer game-loops-case-magic-land final
 
GAME LOOP
GAME LOOPGAME LOOP
GAME LOOP
 
Where the Whales live: the pyramid model of F2P design
Where the Whales live: the pyramid model of F2P designWhere the Whales live: the pyramid model of F2P design
Where the Whales live: the pyramid model of F2P design
 
Windows 8 Basic Overview
Windows 8 Basic OverviewWindows 8 Basic Overview
Windows 8 Basic Overview
 
Presentazione ThumbleCrash - last version
Presentazione ThumbleCrash - last versionPresentazione ThumbleCrash - last version
Presentazione ThumbleCrash - last version
 
Lost John - Mobile Game Development
Lost John - Mobile Game DevelopmentLost John - Mobile Game Development
Lost John - Mobile Game Development
 
Digital destroyers davis_jonathon_controller design_0415
Digital destroyers davis_jonathon_controller design_0415Digital destroyers davis_jonathon_controller design_0415
Digital destroyers davis_jonathon_controller design_0415
 
Turn complex to epic - Zelda goals planning
Turn complex to epic - Zelda goals planningTurn complex to epic - Zelda goals planning
Turn complex to epic - Zelda goals planning
 
Steam: the latest trends and insights for developers
Steam: the latest trends and insights for developersSteam: the latest trends and insights for developers
Steam: the latest trends and insights for developers
 
Game Biz-Dev Party (GBDPxSEOUL) 2012
Game Biz-Dev Party (GBDPxSEOUL) 2012Game Biz-Dev Party (GBDPxSEOUL) 2012
Game Biz-Dev Party (GBDPxSEOUL) 2012
 
Activate all angry birds
Activate all angry birdsActivate all angry birds
Activate all angry birds
 
The story of_making_raimy
The story of_making_raimyThe story of_making_raimy
The story of_making_raimy
 

Destacado

Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)R.Harish Navnit
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric VanderburgEric Vanderburg
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction Mohamed Gad
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux SecurityMichael Boman
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?Michael Boelen
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsAnne Nicolas
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with LynisMichael Boelen
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloudDobrica Pavlinušić
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to ToolingMichael Boelen
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security OverviewKernel TLV
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls david rom
 

Destacado (20)

Bittorrent
BittorrentBittorrent
Bittorrent
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)
 
Linux security
Linux securityLinux security
Linux security
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
 
Linux Security Myth
Linux Security MythLinux Security Myth
Linux Security Myth
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with Lynis
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloud
 
Linux Hardening
Linux HardeningLinux Hardening
Linux Hardening
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 

Similar a Game cih

Live Scoring Visualizer @JOYC2017Final Report
Live Scoring Visualizer @JOYC2017Final ReportLive Scoring Visualizer @JOYC2017Final Report
Live Scoring Visualizer @JOYC2017Final Reporteagle0wl
 
Getting started with MonoGame using 2D
Getting started with MonoGame using 2DGetting started with MonoGame using 2D
Getting started with MonoGame using 2DSimon Jackson
 
The importance of just-in-time operation of social games
The importance of just-in-time operation of social gamesThe importance of just-in-time operation of social games
The importance of just-in-time operation of social gamesaction.vn
 
OGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_Glooops
OGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_GlooopsOGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_Glooops
OGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_GlooopsBuff Nguyen
 
The Rise and Rise of Idle Games
The Rise and Rise of Idle GamesThe Rise and Rise of Idle Games
The Rise and Rise of Idle GamesAnthony Pecorella
 
Hackathon 2013 - The Art Of Cheating In Games
Hackathon 2013 - The Art Of Cheating In GamesHackathon 2013 - The Art Of Cheating In Games
Hackathon 2013 - The Art Of Cheating In GamesSouhail Hammou
 
Developing great games for Windows 8 by Lorenzo Barbieri
Developing great games for Windows 8 by Lorenzo BarbieriDeveloping great games for Windows 8 by Lorenzo Barbieri
Developing great games for Windows 8 by Lorenzo BarbieriCodemotion
 
Software Engineer- A unity 3d Game
Software Engineer- A unity 3d GameSoftware Engineer- A unity 3d Game
Software Engineer- A unity 3d GameIsfand yar Khan
 
Just-in-time Operation in Social Games
Just-in-time Operation in Social GamesJust-in-time Operation in Social Games
Just-in-time Operation in Social Gameswe20
 
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...CODE BLUE
 
Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...
Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...
Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...Jessica Tams
 
Playoff how to create a game
Playoff how to create a gamePlayoff how to create a game
Playoff how to create a gameSilvia Galessi
 
Increasing the chance of a commercial hit
Increasing the chance of a commercial hitIncreasing the chance of a commercial hit
Increasing the chance of a commercial hitPaweł Weder
 
DevLearn 2017 Play to Learn workshop slides
DevLearn 2017 Play to Learn workshop slidesDevLearn 2017 Play to Learn workshop slides
DevLearn 2017 Play to Learn workshop slidesSharon Boller
 

Similar a Game cih (20)

Live Scoring Visualizer @JOYC2017Final Report
Live Scoring Visualizer @JOYC2017Final ReportLive Scoring Visualizer @JOYC2017Final Report
Live Scoring Visualizer @JOYC2017Final Report
 
Getting started with MonoGame using 2D
Getting started with MonoGame using 2DGetting started with MonoGame using 2D
Getting started with MonoGame using 2D
 
InGyre Deck
InGyre DeckInGyre Deck
InGyre Deck
 
The importance of just-in-time operation of social games
The importance of just-in-time operation of social gamesThe importance of just-in-time operation of social games
The importance of just-in-time operation of social games
 
OGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_Glooops
OGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_GlooopsOGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_Glooops
OGDC2012 Just-in-time Operation in Social Games_Mr.Eiji Okuda_Glooops
 
Future Warfare
Future WarfareFuture Warfare
Future Warfare
 
Game Salad Study
Game Salad StudyGame Salad Study
Game Salad Study
 
Idle Chatter - GDC 2016
Idle Chatter - GDC 2016Idle Chatter - GDC 2016
Idle Chatter - GDC 2016
 
The Rise and Rise of Idle Games
The Rise and Rise of Idle GamesThe Rise and Rise of Idle Games
The Rise and Rise of Idle Games
 
Hackathon 2013 - The Art Of Cheating In Games
Hackathon 2013 - The Art Of Cheating In GamesHackathon 2013 - The Art Of Cheating In Games
Hackathon 2013 - The Art Of Cheating In Games
 
Developing great games for Windows 8 by Lorenzo Barbieri
Developing great games for Windows 8 by Lorenzo BarbieriDeveloping great games for Windows 8 by Lorenzo Barbieri
Developing great games for Windows 8 by Lorenzo Barbieri
 
Software Engineer- A unity 3d Game
Software Engineer- A unity 3d GameSoftware Engineer- A unity 3d Game
Software Engineer- A unity 3d Game
 
Just-in-time Operation in Social Games
Just-in-time Operation in Social GamesJust-in-time Operation in Social Games
Just-in-time Operation in Social Games
 
Future warfare
Future warfareFuture warfare
Future warfare
 
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
 
Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...
Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...
Developing Hardcore Games as an Indie Dev – Captain Strike Post-Mortem | Le G...
 
Playoff how to create a game
Playoff how to create a gamePlayoff how to create a game
Playoff how to create a game
 
Increasing the chance of a commercial hit
Increasing the chance of a commercial hitIncreasing the chance of a commercial hit
Increasing the chance of a commercial hit
 
DevLearn 2017 Play to Learn workshop slides
DevLearn 2017 Play to Learn workshop slidesDevLearn 2017 Play to Learn workshop slides
DevLearn 2017 Play to Learn workshop slides
 
Game Procedures
Game ProceduresGame Procedures
Game Procedures
 

Último

Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...
Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...
Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...Amil Baba Company
 
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba Company
 
NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...
NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...
NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...Amil baba
 
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...Amil Baba Dawood bangali
 
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证gwhohjj
 
Deconstruction theory ppt easy ppt for ms
Deconstruction theory ppt easy ppt for msDeconstruction theory ppt easy ppt for ms
Deconstruction theory ppt easy ppt for mshudamushtaq259
 
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
Gripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to MissGripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to Missget joys
 
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEApsara Of India
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Amil Baba Company
 
原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证
原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证
原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证jdkhjh
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...Amil baba
 
Statement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfileStatement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfilef4ssvxpz62
 
Vip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services AvailableVip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services AvailableKomal Khan
 
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Sonam Pathan
 
North Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunNorth Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunKomal Khan
 
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一lvtagr7
 
NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...
NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...
NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...Amil Baba Dawood bangali
 

Último (20)

Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...
Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...
Amil Baba In Rawalpindi Kala Jadu Expert Rawalpindi amil baba in rawalpindi j...
 
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
 
Call Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any TimeCall Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any Time
 
NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...
NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...
NO1 Certified Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpi...
 
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
 
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
 
Deconstruction theory ppt easy ppt for ms
Deconstruction theory ppt easy ppt for msDeconstruction theory ppt easy ppt for ms
Deconstruction theory ppt easy ppt for ms
 
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
 
Gripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to MissGripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to Miss
 
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
 
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
 
原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证
原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证
原版1:1复刻帕森斯设计学院毕业证Parsons毕业证留信学历认证
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
 
Statement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfileStatement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfile
 
Vip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services AvailableVip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services Available
 
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
 
North Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunNorth Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full Fun
 
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
 
NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...
NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...
NO1 WorldWide Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi ...
 

Game cih

  • 1. GAME CIH The Ultimate Hacking Tool for Android OS
  • 2. ABOUT GAME CIH • Android GameCIH(CheatIng Hacker) • This App was created by “Software Magician” in Taiwan • The latest version of the app is 3.0.0 which started distribution from 2012/02/09
  • 3. HOW IT WORKS • This app actually accesses the memory locations and monitor all the changes. • Since it monitors all the changes occurring in memory locations , Game CIH requires ROOT Permissions in the android. • There are practically millions of memory locations So the app needs to filter out the changes to get a limited number of locations to be edited. • Using this app, we can alter high scores, life of character, coins and money etc.
  • 4. FULL TUTORIAL • For this project I am using Game CIH 3 and The game to be hacked is “Subway Surfers”- by Kiloo Games. + =
  • 6. SIMPLE STEPS TO HACK A GAME • Start the game. • Play for a few seconds normally and pause your game after checking your current score. • Then click the search button in gamecih and search for your current score.
  • 7. • It will take 2-3 seconds to search and find the locations containing the current scores. • The number of results may vary according to your score but usually we get 1-2 million results. • Now resume your play and increase your score.
  • 8. SIMPLE STEPS OF HACKING ANY GAME • After you increased your score, jump back to GameCIH and then search for the values that increased using the plus (+) button. • It will again give you enormous number of results.
  • 9. • After you pressed the plus button you will get the updated results. • Again perform the previous steps and increase your score and then search again.
  • 10. • Keep performing the steps until you get limited results which could be easily identified. • Then search for your current score. • To search you can use “Input Number” function or manually scroll down.
  • 11. AFTER YOU ACCESS YOUR SCORES… • After you get your scores in the final list, tap on that to edit it. • Edit and increase the scores as much as you can. • You will rule the leader boards.
  • 12. THUS YOUR GAME WILL BE HACKED • After editing the score, come back to your game, this time the score will be according to your wish. • Note: Use lock button to lock your scores to particular point otherwise the scores will be overwritten by the game modules.
  • 14. CONCLUSION • Almost all games can be hacked by using GameCIH. • It takes hardly 5 minutes to be on the top of the leaderboards. • Users of this app are unbeatable because they control the flow of data.
  • 15. DRAWBACKS • The supreme requirement of this app is ROOT Access. • The lite version is very slow because to edit a single address we have to wait for 5 seconds. • Using this app sometimes crashes the game and Also corrupt the internal files of the game.
  • 16. PRESENTATION BY • Harshvardhan Malpani • Maharaja Agrasen Institute of Technology • http://harsh.site88.net • On Facebook • Twitter • My Fan Page