Zach Wathen

Experienced C#, C & MySQL developer with years of experience in anti-cheat detection mechanisms and evasion tactics.

What I Do

Anti-Cheat R&D

Developed a kernel mode anti-cheat with cheat detection measures similar to those found in the most popular anti-cheats on the market (Battle-Eye, Easy Anti-Cheat). Although it never made it to the market, it taught me extremely valuable information about the windows OS, cyber security and reverse engineering.

Protections included:
• Scanning for vulnerable drivers present and previously unloaded.
• Signature scanning the full memory of the system for malicious code signatures/strings.
• Detecting rouge system threads executing unsigned kernel shellcode using multiple methods including bruteforcing the PspCidTable entries, monitoring the KPRCBs, using NMIs and IPIs then subsequently stack walking the thread's call stack and analyzing the validity of the current IP.
• Stripping read/write access from handles opened in usermode to a protected process.
• Detecting DKOM attempts on opaque kernel structures such as the PspCidTable, EPROCESS->ActiveProcessLinks and ETHREAD->ThreadListHead in attempts to hide a process or thread.
• Detecting process-specific kernel patches/rogue allocations achieved through modifying a process's upper 256 PML4E values, redirecting the MmPfnDatabase entries then nulling the original entries in the kernel DTB.
• Detecting blatant .text patches in a protected process by comparing the loaded bytes in memory vs the valid, signed binary on disk.
• Using multiple hooking techniques to take control of context swaps (ntoskrnl->SwapContext without triggering PG) in order to protect a specific virtual address range from non-whitelisted threads accessing it.
• Setup usermode traps on protected variables to detect outside modifications.
• Setup a kernel-mode rendering and input system without calling win32gdi functions.
• Constantly evolved an exploit to bypass all of these protections to help simulate the never-ending cat and mouse game of cheaters vs anti-cheats.

C#, C, C++, ASP, MySQL App Dev

Develops highly efficient and well documented applications for a range of purposes.

Web Design

Develops and maintains multiple custom internal administrative sites using Bootstrap, JS and PHP.

Develops and maintains multiple WordPress sites that often make use of WooCommerce.

Unity Game Development

Develops Unity multiplayer games and custom plugins including a basic anti-cheat plugin.

Infor SyteLine Administration & Development

Develops and maintains multiple custom Infor CSI (SyteLine) forms, dataviews and integrations for a local electronics manufacturer. Manages user access and 2FA.

Testimonials

Fun Facts

End Users Reached

115,000 (As an Entrepreneur)

Proficient Programming Languages

7 C, C++, C#, MySQL, PHP, JS, VB.NET

Kernel Mode R&D Hours

2500 Multiple Vulnerable Drivers Located