by Reassembly
This guide is how to use Echo, the step by step guide on how to catch suspected ghost cheaters on your server.
Have the user click the speaker icon so that you can't hear yourself.
Copy the link given, by clicking on the gray chain icon. Then send that link to the person you are screensharing. Tell them to download and execute the file when downloaded.
Echo should begin scanning automatically. It will come up with a progress bar both on your dashboard and on the GUI while it scans. If echo gets stuck on 70% for a while, that is okay, that is when echo is doing a lot of work to catch cheaters. When the scan is finished, it should automatically refresh your scans page, if it doesn't just refresh it yourself
That is the scanning part complete, now comes the analysis.
anything there
If something does show in that list, there is a recording software open and is most likely recording the screenshare, you can check this for yourself and if they are recording it, you can either ask them to stop recording, or ban them, depending on what your server does.
Ignore all the results that say "Custom String" at the beginning, we will get onto that soon. For now look at the bottom 2.
"Traces found for Generic Cheat out of instance". This means a client was executed on the computer since last restart, but does not necessarily mean it is in their current instance of minecraft (they restarted their game after using a client). This normally does mean they are cheating, but it isn't 100% proof, If it said "in instance", that would mean it was in that current instance, so they have a hacked client injected in that minecraft instance.
Pcaclient shows what files have been executed since last explorer restart. As you can see above, the user in question executed a file at the path "E:\External Clients\Vape Lite.exe". Obviously in a real screenshare it won't tend to be this easy. But it works for demonstration. If this section is quite empty, refer to the "Start Times" section
Let's take a look at this segment, as we can see, joshua executed a file named "AnyDesk", then he created (or downloaded) a new exe by the same name. He then replaced the AnyDesk.exe file, and ran the replaced exe. Let's think about it in a different way, The user renamed their client to "AnyDesk.exe'' and ran it. Then he downloaded a legitimate anydesk.exe file, and replaced the fake anydesk (the hacked client) with the real exe, then ran the real exe. If we look at the Key Indications, we see the following:
Which implies that echo found traces for "Entropy" in a file named "AnyDesk.exe".
Also, earlier in the file logs, you can see this:
This says that he renamed a file from "entropy.exe" to "AnyDesk". Which gives away that the user had a file called entropy.exe that he renamed the AnyDesk.exe
If you would like to see this scan in more detail, You can find it at https://echo.ac/example.
Also, You can use file logs for looking at if an antivirus has flagged a downloaded file, which often happens to hacked clients.
As you can see in this scan, joshe created a weird file called "PbJOm_Yo.exe", which was then renamed to echo, In this scan, the antivirus did download the file into quarantine, which is what named it that, but was then renamed to the real exe once scanned. This could be a possible give away to a hacked client being used
Notice how there are 2 DnsJumper exes on this users pc, and that the compilation times are different, this implies that the user has 2 DNS Jumper exes, and if the player both flagged a detection, executed a file that appeared here twice with 2 different times, they are most likely hacking.
If you click the dropdown menu at the "Resource Packs" section, you can see the packs they have on their PC.
Echo does have the ability to detect someone using veracrypt, you should see a notification that looks like this:
And you will probably see file logs like this:
Executed: F:/AnyDesk.exe 24 Jan 2021 08:29:26
Executed: F:/Yori-1.exe 24 Jan 2021 08:22:52
If you get this warning as well as a cheat detection, it probably heams the user is cheating, I recommend you look for other indications (such as a file being executed and deleted).