Core Concepts Overview
ACHCE Client is an anti-cheat system designed to protect Halo Combat Evolved game servers from unauthorized modifications, injectors, and malicious tools. This overview introduces both currently implemented features and planned protection mechanisms.This documentation describes the complete architectural vision for ACHCE Client, including both implemented features and planned enhancements.
Protection Architecture
The anti-cheat system implements four primary protection mechanisms:TopMost Window Protection
Prevents external tool injection by maintaining a fullscreen overlay window that blocks unauthorized applications
Temporary Folder Isolation
Uses ephemeral storage for game files to prevent modified game clients from bypassing protection
Hardware-Based Identification
Identifies players using unique hardware identifiers instead of easily-spoofed IP addresses
How ACHCE Client Works
Initial Connection Flow
When a player launches the game through ACHCE Client, the following sequence occurs:Code Example: Client Initialization
The main form (Form1.cs) handles the initial setup and database connection:
The client generates a random session name (4-10 characters) for each connection to track active players in the database without requiring manual registration.
Core Protection Layers
1. TopMost Window Blocker
The TopMost protection creates a fullscreen overlay window that remains on top of all other applications. This prevents users from opening external tools like injectors during gameplay. Key Features:- Fullscreen coverage matching monitor resolution
- Always-on-top window priority
- Prevents focus stealing by external applications
2. Temporary Folder System
ACHCE Client uses temporary storage for game files, ensuring that modified clients (like HAC2 Release or Chimera) cannot bypass the anti-cheat by loading altered game assets. Key Features:- Isolated game file environment
- Automatic cleanup on exit
- Prevents persistent file modifications
3. Hardware Identification
Instead of relying on IP addresses (which can be easily changed with VPNs), ACHCE Client identifies players using unique hardware identifiers derived from BIOS UUID and other hardware components. Key Features:- Hardware-based player fingerprinting
- VPN-resistant identification
- Automatic player tracking
4. Ban Management System
The ban system uses Firebase as a real-time database to track player sessions, manage bans, and control access to protected servers. Key Features:- Real-time player session tracking
- Automatic session cleanup
- Hardware-based ban enforcement
Database Integration
ACHCE Client uses Firebase Realtime Database to manage player sessions and ban data. The connection is established using FireSharp:Session Management
Player sessions are automatically registered and cleaned up:IP Address Detection
The system retrieves the player’s public IP address using an external service:Protection Philosophy
ACHCE Client follows a multi-layered security approach:- Prevention over Detection: Block cheating tools before they can be used
- Hardware-Based Identity: Use immutable hardware identifiers rather than changeable network addresses
- Isolated Environment: Run games in controlled, temporary environments
- Real-Time Monitoring: Track active sessions through cloud database integration
- Continuous Updates: Regular improvements to counter emerging cheat methods
System Requirements
To function properly, ACHCE Client requires:- Active internet connection (for Firebase database access)
- Windows operating system with .NET Framework 4.7.2+
- Administrator privileges (for TopMost window creation and file system access)
- Access to hardware identification APIs
Next Steps
TopMost Protection
Learn how the window overlay prevents injector access
Temporary Folders
Understand the isolated file system approach
Hardware ID
Explore VPN-resistant player identification
Ban System
Discover how bans are enforced and managed
Security Considerations
Why not rely on IP addresses?
Why not rely on IP addresses?
IP addresses can be easily changed using VPN services, proxy servers, or by requesting a new IP from ISPs. This makes IP-based bans ineffective against determined cheaters. Hardware identification provides a more permanent tracking method.
How does TopMost prevent all injectors?
How does TopMost prevent all injectors?
While TopMost makes it significantly harder to open external tools, it’s one layer in a multi-faceted approach. The combination of window blocking, temporary file isolation, and hardware tracking creates a robust defense system.
What happens to game files after exit?
What happens to game files after exit?
When the player exits the game, the temporary folder containing game files is automatically deleted. This ensures that any modifications made during the session are not persisted, requiring fresh, verified files on the next launch.
Can the system work offline?
Can the system work offline?
No, ACHCE Client requires an active internet connection to communicate with the Firebase database for session management and ban checking. This online requirement is essential for real-time protection.