<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Daniel+Miessler</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Daniel+Miessler"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Daniel_Miessler"/>
		<updated>2026-05-24T09:54:17Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246190</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246190"/>
				<updated>2018-12-19T23:58:19Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: Updated contributors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Internet of Things (IoT) Project ==&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Updated!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project for 2018 has just been released!&lt;br /&gt;
&lt;br /&gt;
[[File:2018 IoT Top10.png|center|thumb|1290x1290px]]&lt;br /&gt;
&lt;br /&gt;
== Philosophy ==&lt;br /&gt;
The OWASP Internet of Things Project was started in 2014 as a way help Developers, Manufacturers, Enterprises, and Consumers to make better decisions regarding the creation and use of IoT systems.&lt;br /&gt;
&lt;br /&gt;
This continues today with the 2018 release of the OWASP IoT Top 10, which represents the top ten things to avoid when building, deploying, or managing IoT systems. The primary theme for the 2018 OWASP Internet of Things Top 10 is simplicity. Rather than having separate lists for risks vs. threats vs. vulnerabilities—or for developers vs. enterprises vs. consumers—the project team elected to have a single, unified list that captures the top things to avoid when dealing with IoT Security.&lt;br /&gt;
&lt;br /&gt;
The team recognized that there are now dozens of organizations releasing elaborate guidance on IoT Security—all of which are designed for slightly different audiences and industry verticals. We thought the most useful resource we could create is a single list that addresses the highest priority issues for manufacturers, enterprises, and consumers at the same time.&lt;br /&gt;
&lt;br /&gt;
The result is the 2018 OWASP IoT Top 10.&lt;br /&gt;
&lt;br /&gt;
== Methodology ==&lt;br /&gt;
The project team is a collection of volunteer professionals from within the security industry, with experience spanning multiple areas of expertise, including: manufacturers, consulting, security testers, developers, and many more.&lt;br /&gt;
&lt;br /&gt;
The project was conducted in the following phases:&lt;br /&gt;
# '''Team Formation''': finding people who would be willing to contribute to the 2018 update, both as SMEs and as project leaders to perform various tasks within the duration of the project.&lt;br /&gt;
# '''Project Review:''' analysis of the 2014 project to determine what’s changed in the industry since that release, and how the list should be updated given those changes.&lt;br /&gt;
# '''Data Collection''': collection and review of multiple vulnerability sources (both public and private), with special emphasis on which issues caused the most actual impact and damage.&lt;br /&gt;
# '''Sister Project Review''': a review of dozens of other IoT Security projects to ensure that we’d not missed something major and that we were comfortable with both the content and prioritization of our release. Examples included: [https://cloudsecurityalliance.org/artifacts/csa-iot-controls-matrix/ CSA IoT Controls Matrix], [https://api.ctia.org/wp-content/uploads/2018/08/CTIA-IoT-Cybersecurity-Certification-Test-Plan-V1_0.pdf CTIA], [http://iot.stanford.edu/ Stanford’s Secure Internet of Things Project], [https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8200.pdf NISTIR 8200], [https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport ENISA IoT Baseline Report], [https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/747413/Code_of_Practice_for_Consumer_IoT_Security_October_2018.pdf Code of Practice for Consumer IoT Security,] and others.&lt;br /&gt;
# '''Community Draft Feedback''': release of the draft to the community for review, including multiple Twitter calls for comments, the use of a public feedback form, and a number of public talks where feedback was gathered. The feedback was then reviewed by the team along with initial Data Collection, as well as Sister Project Review, to create the list contents and prioritization.&lt;br /&gt;
# '''Release:''' release of the project to the public in December 2018.&lt;br /&gt;
&lt;br /&gt;
== The Future of the OWASP IoT Top 10 ==&lt;br /&gt;
The team has a number of activities planned to continue improving on the project going forward.&lt;br /&gt;
&lt;br /&gt;
Some of the items being discussed include:&lt;br /&gt;
* Continuing to improve the list on a two-year cadence, incorporating feedback from the community and from additional project contributors to ensure we are staying current with issues facing the industry.&lt;br /&gt;
* Mapping the list items to other OWASP projects, such as the ASVS, and perhaps to other projects outside OWASP as well.&lt;br /&gt;
* Expanding the project into other aspects of IoT—including embedded security, ICS/ SCADA,etc.&lt;br /&gt;
* Adding use and abuse cases, with multiple examples, to solidify each concept discussed.&lt;br /&gt;
* Considering the addition of reference architectures, so we can not only tell people what to avoid, but how to do what they need to do securely.&lt;br /&gt;
&lt;br /&gt;
Participation in the OWASP IoT Project is open to the community. We take input from all participants — whether you’re a developer, a manufacturer, a penetration tester, or someone just trying to implement IoT securely. You can find the team meeting every other Friday in the the #iot-security room of the OWASP Slack Channel.&lt;br /&gt;
&lt;br /&gt;
'''''The OWASP IoT Security Team, 2018'''''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
* Vishruta Rudresh&lt;br /&gt;
* Aaron Guzman&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== IoT Top 2018 Contributors ==&lt;br /&gt;
* Vijayamurugan Pushpanathan &lt;br /&gt;
* Alexander Lafrenz &lt;br /&gt;
* Masahiro Murashima &lt;br /&gt;
* Charlie Worrell &lt;br /&gt;
* José A. Rivas (jarv) &lt;br /&gt;
* Pablo Endres &lt;br /&gt;
* Ade Yoseman &lt;br /&gt;
* Cédric Levy-Bencheotn&lt;br /&gt;
* Jason Andress&lt;br /&gt;
* Amélie Didion - Designer&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/C-Based_Toolchain_Hardening OWASP C-based Toolchain Hardening]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf OWASP IoT Top Ten 2018]&lt;br /&gt;
&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Top 10 =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Internet of Things (IoT) Top 10 2018 ==&lt;br /&gt;
The [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf OWASP IoT Top 10 - 2018] is now available.&lt;br /&gt;
* I1 Weak Guessable, or Hardcoded Passwords&lt;br /&gt;
&lt;br /&gt;
* I2 Insecure Network Services&lt;br /&gt;
&lt;br /&gt;
* I3 Insecure Ecosystem Interfaces&lt;br /&gt;
&lt;br /&gt;
* I4 Lack of Secure Update Mechanism&lt;br /&gt;
&lt;br /&gt;
* I5 Use of Insecure or Outdated Components&lt;br /&gt;
&lt;br /&gt;
* I6 Insufficient Privacy Protection&lt;br /&gt;
&lt;br /&gt;
* I7 Insecure Data Transfer and Storage&lt;br /&gt;
&lt;br /&gt;
* I8 Lack of Device Management&lt;br /&gt;
&lt;br /&gt;
* I9 Insecure Default Settings&lt;br /&gt;
&lt;br /&gt;
* I10 Lack of Physical Hardening&lt;br /&gt;
== Internet of Things (IoT) Top 10 2014 ==&lt;br /&gt;
* [[Top 10 2014-I1 Insecure Web Interface|I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top 10 2014-I2 Insufficient Authentication/Authorization|I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top 10 2014-I3 Insecure Network Services|I3 Insecure Network Services]]&lt;br /&gt;
* [[Top 10 2014-I4 Lack of Transport Encryption|I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top 10 2014-I5 Privacy Concerns|I5 Privacy Concerns]]&lt;br /&gt;
* [[Top 10 2014-I6 Insecure Cloud Interface|I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top 10 2014-I7 Insecure Mobile Interface|I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top 10 2014-I8 Insufficient Security Configurability|I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top 10 2014-I9 Insecure Software/Firmware|I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top 10 2014-I10 Poor Physical Security|I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246189</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246189"/>
				<updated>2018-12-19T23:57:55Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: Updated project leaders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Internet of Things (IoT) Project ==&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Updated!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project for 2018 has just been released!&lt;br /&gt;
&lt;br /&gt;
[[File:2018 IoT Top10.png|center|thumb|1290x1290px]]&lt;br /&gt;
&lt;br /&gt;
== Philosophy ==&lt;br /&gt;
The OWASP Internet of Things Project was started in 2014 as a way help Developers, Manufacturers, Enterprises, and Consumers to make better decisions regarding the creation and use of IoT systems.&lt;br /&gt;
&lt;br /&gt;
This continues today with the 2018 release of the OWASP IoT Top 10, which represents the top ten things to avoid when building, deploying, or managing IoT systems. The primary theme for the 2018 OWASP Internet of Things Top 10 is simplicity. Rather than having separate lists for risks vs. threats vs. vulnerabilities—or for developers vs. enterprises vs. consumers—the project team elected to have a single, unified list that captures the top things to avoid when dealing with IoT Security.&lt;br /&gt;
&lt;br /&gt;
The team recognized that there are now dozens of organizations releasing elaborate guidance on IoT Security—all of which are designed for slightly different audiences and industry verticals. We thought the most useful resource we could create is a single list that addresses the highest priority issues for manufacturers, enterprises, and consumers at the same time.&lt;br /&gt;
&lt;br /&gt;
The result is the 2018 OWASP IoT Top 10.&lt;br /&gt;
&lt;br /&gt;
== Methodology ==&lt;br /&gt;
The project team is a collection of volunteer professionals from within the security industry, with experience spanning multiple areas of expertise, including: manufacturers, consulting, security testers, developers, and many more.&lt;br /&gt;
&lt;br /&gt;
The project was conducted in the following phases:&lt;br /&gt;
# '''Team Formation''': finding people who would be willing to contribute to the 2018 update, both as SMEs and as project leaders to perform various tasks within the duration of the project.&lt;br /&gt;
# '''Project Review:''' analysis of the 2014 project to determine what’s changed in the industry since that release, and how the list should be updated given those changes.&lt;br /&gt;
# '''Data Collection''': collection and review of multiple vulnerability sources (both public and private), with special emphasis on which issues caused the most actual impact and damage.&lt;br /&gt;
# '''Sister Project Review''': a review of dozens of other IoT Security projects to ensure that we’d not missed something major and that we were comfortable with both the content and prioritization of our release. Examples included: [https://cloudsecurityalliance.org/artifacts/csa-iot-controls-matrix/ CSA IoT Controls Matrix], [https://api.ctia.org/wp-content/uploads/2018/08/CTIA-IoT-Cybersecurity-Certification-Test-Plan-V1_0.pdf CTIA], [http://iot.stanford.edu/ Stanford’s Secure Internet of Things Project], [https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8200.pdf NISTIR 8200], [https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport ENISA IoT Baseline Report], [https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/747413/Code_of_Practice_for_Consumer_IoT_Security_October_2018.pdf Code of Practice for Consumer IoT Security,] and others.&lt;br /&gt;
# '''Community Draft Feedback''': release of the draft to the community for review, including multiple Twitter calls for comments, the use of a public feedback form, and a number of public talks where feedback was gathered. The feedback was then reviewed by the team along with initial Data Collection, as well as Sister Project Review, to create the list contents and prioritization.&lt;br /&gt;
# '''Release:''' release of the project to the public in December 2018.&lt;br /&gt;
&lt;br /&gt;
== The Future of the OWASP IoT Top 10 ==&lt;br /&gt;
The team has a number of activities planned to continue improving on the project going forward.&lt;br /&gt;
&lt;br /&gt;
Some of the items being discussed include:&lt;br /&gt;
* Continuing to improve the list on a two-year cadence, incorporating feedback from the community and from additional project contributors to ensure we are staying current with issues facing the industry.&lt;br /&gt;
* Mapping the list items to other OWASP projects, such as the ASVS, and perhaps to other projects outside OWASP as well.&lt;br /&gt;
* Expanding the project into other aspects of IoT—including embedded security, ICS/ SCADA,etc.&lt;br /&gt;
* Adding use and abuse cases, with multiple examples, to solidify each concept discussed.&lt;br /&gt;
* Considering the addition of reference architectures, so we can not only tell people what to avoid, but how to do what they need to do securely.&lt;br /&gt;
&lt;br /&gt;
Participation in the OWASP IoT Project is open to the community. We take input from all participants — whether you’re a developer, a manufacturer, a penetration tester, or someone just trying to implement IoT securely. You can find the team meeting every other Friday in the the #iot-security room of the OWASP Slack Channel.&lt;br /&gt;
&lt;br /&gt;
'''''The OWASP IoT Security Team, 2018'''''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
* Vishruta Rudresh&lt;br /&gt;
* Aaron Guzman&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== IoT Top 2018 Contributors ==&lt;br /&gt;
* Vishruta Rudresh&lt;br /&gt;
* Vijayamurugan Pushpanathan &lt;br /&gt;
* Aaron Guzman &lt;br /&gt;
* Alexander Lafrenz &lt;br /&gt;
* Masahiro Murashima &lt;br /&gt;
* Charlie Worrell &lt;br /&gt;
* José A. Rivas (jarv) &lt;br /&gt;
* Pablo Endres &lt;br /&gt;
* Ade Yoseman &lt;br /&gt;
* Cédric Levy-Bencheotn&lt;br /&gt;
* Jason Andress&lt;br /&gt;
* Amélie Didion - Designer&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/C-Based_Toolchain_Hardening OWASP C-based Toolchain Hardening]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf OWASP IoT Top Ten 2018]&lt;br /&gt;
&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Top 10 =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Internet of Things (IoT) Top 10 2018 ==&lt;br /&gt;
The [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf OWASP IoT Top 10 - 2018] is now available.&lt;br /&gt;
* I1 Weak Guessable, or Hardcoded Passwords&lt;br /&gt;
&lt;br /&gt;
* I2 Insecure Network Services&lt;br /&gt;
&lt;br /&gt;
* I3 Insecure Ecosystem Interfaces&lt;br /&gt;
&lt;br /&gt;
* I4 Lack of Secure Update Mechanism&lt;br /&gt;
&lt;br /&gt;
* I5 Use of Insecure or Outdated Components&lt;br /&gt;
&lt;br /&gt;
* I6 Insufficient Privacy Protection&lt;br /&gt;
&lt;br /&gt;
* I7 Insecure Data Transfer and Storage&lt;br /&gt;
&lt;br /&gt;
* I8 Lack of Device Management&lt;br /&gt;
&lt;br /&gt;
* I9 Insecure Default Settings&lt;br /&gt;
&lt;br /&gt;
* I10 Lack of Physical Hardening&lt;br /&gt;
== Internet of Things (IoT) Top 10 2014 ==&lt;br /&gt;
* [[Top 10 2014-I1 Insecure Web Interface|I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top 10 2014-I2 Insufficient Authentication/Authorization|I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top 10 2014-I3 Insecure Network Services|I3 Insecure Network Services]]&lt;br /&gt;
* [[Top 10 2014-I4 Lack of Transport Encryption|I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top 10 2014-I5 Privacy Concerns|I5 Privacy Concerns]]&lt;br /&gt;
* [[Top 10 2014-I6 Insecure Cloud Interface|I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top 10 2014-I7 Insecure Mobile Interface|I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top 10 2014-I8 Insufficient Security Configurability|I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top 10 2014-I9 Insecure Software/Firmware|I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top 10 2014-I10 Poor Physical Security|I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246172</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246172"/>
				<updated>2018-12-19T23:14:08Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: Updated!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Updated!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project for 2018 has just been released!.&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/C-Based_Toolchain_Hardening OWASP C-based Toolchain Hardening]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Top 10 =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Internet of Things (IoT) Top 10 2018 ==&lt;br /&gt;
The OWASP IoT Project is currently reviewing the Top Ten list for 2018. The official launch date is December 2018. Provide your insight and expertise by joining the #iot-security channel meetups on Slack.&lt;br /&gt;
* I1 Weak Guessable, or Hardcoded Passwords&lt;br /&gt;
&lt;br /&gt;
* I2 Insecure Network Services&lt;br /&gt;
&lt;br /&gt;
* I3 Insecure Ecosystem Interfaces&lt;br /&gt;
&lt;br /&gt;
* I4 Lack of Secure Update Mechanism&lt;br /&gt;
&lt;br /&gt;
* I5 Use of Insecure or Outdated Components&lt;br /&gt;
&lt;br /&gt;
* I6 Insufficient Privacy Protection&lt;br /&gt;
&lt;br /&gt;
* I7 Insecure Data Transfer and Storage&lt;br /&gt;
&lt;br /&gt;
* I8 Lack of Device Management&lt;br /&gt;
&lt;br /&gt;
* I9 Insecure Default Settings&lt;br /&gt;
&lt;br /&gt;
* I10 Lack of Physical Hardening&lt;br /&gt;
== Internet of Things (IoT) Top 10 2014 ==&lt;br /&gt;
* [[Top 10 2014-I1 Insecure Web Interface|I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top 10 2014-I2 Insufficient Authentication/Authorization|I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top 10 2014-I3 Insecure Network Services|I3 Insecure Network Services]]&lt;br /&gt;
* [[Top 10 2014-I4 Lack of Transport Encryption|I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top 10 2014-I5 Privacy Concerns|I5 Privacy Concerns]]&lt;br /&gt;
* [[Top 10 2014-I6 Insecure Cloud Interface|I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top 10 2014-I7 Insecure Mobile Interface|I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top 10 2014-I8 Insufficient Security Configurability|I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top 10 2014-I9 Insecure Software/Firmware|I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top 10 2014-I10 Poor Physical Security|I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246171</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=246171"/>
				<updated>2018-12-19T23:12:14Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Related Projects */ Fixed slack link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Get Involved!==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Project is currently reviewing the Top Ten list for 2018. Provide your insight and expertise by joining the #iot-security channel meetups on Slack.&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/C-Based_Toolchain_Hardening OWASP C-based Toolchain Hardening]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://1drv.ms/v/s!AucQMYXJNefdwAwa5IPz2cg3cvWe OWASP IoT 2018 Planning Session]&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Top 10 =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Internet of Things (IoT) Top 10 2018 ==&lt;br /&gt;
The OWASP IoT Project is currently reviewing the Top Ten list for 2018. The official launch date is December 2018. Provide your insight and expertise by joining the #iot-security channel meetups on Slack.&lt;br /&gt;
* I1 Weak Guessable, or Hardcoded Passwords&lt;br /&gt;
&lt;br /&gt;
* I2 Insecure Network Services&lt;br /&gt;
&lt;br /&gt;
* I3 Insecure Ecosystem Interfaces&lt;br /&gt;
&lt;br /&gt;
* I4 Lack of Secure Update Mechanism&lt;br /&gt;
&lt;br /&gt;
* I5 Use of Insecure or Outdated Components&lt;br /&gt;
&lt;br /&gt;
* I6 Insufficient Privacy Protection&lt;br /&gt;
&lt;br /&gt;
* I7 Insecure Data Transfer and Storage&lt;br /&gt;
&lt;br /&gt;
* I8 Lack of Device Management&lt;br /&gt;
&lt;br /&gt;
* I9 Insecure Default Settings&lt;br /&gt;
&lt;br /&gt;
* I10 Lack of Physical Hardening&lt;br /&gt;
== Internet of Things (IoT) Top 10 2014 ==&lt;br /&gt;
* [[Top 10 2014-I1 Insecure Web Interface|I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top 10 2014-I2 Insufficient Authentication/Authorization|I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top 10 2014-I3 Insecure Network Services|I3 Insecure Network Services]]&lt;br /&gt;
* [[Top 10 2014-I4 Lack of Transport Encryption|I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top 10 2014-I5 Privacy Concerns|I5 Privacy Concerns]]&lt;br /&gt;
* [[Top 10 2014-I6 Insecure Cloud Interface|I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top 10 2014-I7 Insecure Mobile Interface|I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top 10 2014-I8 Insufficient Security Configurability|I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top 10 2014-I9 Insecure Software/Firmware|I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top 10 2014-I10 Poor Physical Security|I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SecLists_Project&amp;diff=241287</id>
		<title>OWASP SecLists Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SecLists_Project&amp;diff=241287"/>
				<updated>2018-06-13T11:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=OWASP SecLists=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==About==&lt;br /&gt;
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/danielmiessler/SecLists SecLists GitHub Repository]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This project is licensed under the MIT license.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quick Download==&lt;br /&gt;
[https://github.com/danielmiessler/SecLists/archive/master.zip Download SecLists]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Change Log==&lt;br /&gt;
* [https://github.com/danielmiessler/SecLists/releases SecLists (Releases)]&lt;br /&gt;
* [https://github.com/danielmiessler/SecLists/commits SecLists (Commits)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Code Repo==&lt;br /&gt;
* [https://github.com/danielmiessler/SecLists SecLists]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Email List/Feedback/Log issues==&lt;br /&gt;
Questions? Problem? Please ask on the [https://github.com/danielmiessler/SecLists/issues GitHub Issue page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Feature Requests/Development==&lt;br /&gt;
* Have an idea of something to include? Please create a new requests (as enhancement) here: https://github.com/danielmiessler/SecLists/issues&lt;br /&gt;
* ...Better yet, open up a new pull request here: https://github.com/danielmiessler/SecLists/pulls (Note: We highly encourage you to include the source)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Leaders==&lt;br /&gt;
Daniel Miessler ([https://twitter.com/danielmiessler @DanielMiessler]) and Jason Haddix ([https://twitter.com/Jhaddix @Jhaddix])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SecLists_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Breakers]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238454</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238454"/>
				<updated>2018-03-09T16:27:17Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: Updated slack information.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The OWASP Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238453</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=238453"/>
				<updated>2018-03-09T16:25:48Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&amp;lt;!-- Hey Guys - Andy Lewis here.  I'm not great w/slack but when I browse to https://owasp-iot-security.slack.com/signup&lt;br /&gt;
I'm getting &amp;quot;This team's administrator has not enabled email signups.&amp;quot; and &amp;quot;Ask your administrator to send you an invitation.&amp;quot;&lt;br /&gt;
I'm adding this comment in hopes of being able to get in contact w/someone from the project after Blackhat/Defcon.&lt;br /&gt;
If you're reading this, could you please reach out to me &lt;br /&gt;
alewis@owasp.org&lt;br /&gt;
or open up the slack channel to auto-OK @owasp.org addresses?&lt;br /&gt;
Thanks&lt;br /&gt;
Andy&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/7/7b/IoT_Preso_v1.pptx Quick discussion on IoT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231691</id>
		<title>User:DanielMiessler</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231691"/>
				<updated>2017-07-14T13:25:09Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Daniel Miessler 2016.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= Daniel Miessler = &lt;br /&gt;
Daniel is the Director of Advisory Services at IOActive, and is the leader of the [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project OWASP IoT Security Project] and a leader on the [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Work ===&lt;br /&gt;
* Involved in OWASP for over 7 years&lt;br /&gt;
* Have lead multiple projects, including the OWASP Mobile Security Project, the Internet of Things Security Project, and the Game Security Project&lt;br /&gt;
* Regularly speak on Application Security at various conferences, including AppSec Cali in Santa Monica, CA&lt;br /&gt;
&lt;br /&gt;
=== Writing ===&lt;br /&gt;
* Writing at [https://danielmiessler.com/ danielmiessler.com] about information security, with particular focus on application security, since 1999. &lt;br /&gt;
* Featured in hundreds of articles, including for the BBC, Wall Street Journal, Forbes, Information Week, CSO, Fortune, Dark Reading, Threatpost, CNet, and many more. &lt;br /&gt;
* Recently authored [https://www.amazon.com/Real-Internet-Things-Daniel-Miessler-ebook/dp/B01NCLUA5T/ref=asap_bc?ie=UTF8 The Real Internet of Things], published in January of 2017. &lt;br /&gt;
&lt;br /&gt;
=== Podcast ===&lt;br /&gt;
* Produces the [https://danielmiessler.com/podcast/ Unsupervised Learning] podcast and newsletter, which has been voted one of the top three security podcasts multiple times. &lt;br /&gt;
&lt;br /&gt;
=== Online Presence ===&lt;br /&gt;
* [https://www.linkedin.com/in/danielmiessler/ Linkedin]&lt;br /&gt;
* [https://www.slideshare.net/danielmiessler/ Slideshare]&lt;br /&gt;
* [https://twitter.com/danielmiessler Twitter]&lt;br /&gt;
* [https://github.com/danielmiessler Github]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231690</id>
		<title>User:DanielMiessler</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231690"/>
				<updated>2017-07-14T13:24:04Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Online Presence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Daniel Miessler 2016.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= Daniel Miessler = &lt;br /&gt;
Daniel is the Director of Advisory Services at IOActive, and is the leader of the [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project OWASP IoT Security Project] and a leader on the [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Work ===&lt;br /&gt;
* Involved in OWASP for over 7 years&lt;br /&gt;
* Have lead multiple projects, including the OWASP Mobile Security Project, the Internet of Things Security Project, and the Game Security Project&lt;br /&gt;
* Regularly speak on Application Security at various conferences, including AppSec Cali in Santa Monica, CA&lt;br /&gt;
&lt;br /&gt;
=== Writing ===&lt;br /&gt;
* Writing at [https://danielmiessler.com/ danielmiessler.com] about information security, with particular focus on application security, since 1999. &lt;br /&gt;
* Featured in hundreds of articles, including for the BBC, Wall Street Journal, Forbes, Information Week, CSO, Fortune, Dark Reading, Threatpost, CNet, and many more. &lt;br /&gt;
* Recently authored [https://www.amazon.com/Real-Internet-Things-Daniel-Miessler-ebook/dp/B01NCLUA5T/ref=asap_bc?ie=UTF8 The Real Internet of Things], published in January of 2017. &lt;br /&gt;
&lt;br /&gt;
=== Podcast ===&lt;br /&gt;
* Produces the [https://danielmiessler.com/podcast/ Unsupervised Learning] podcast and newsletter, which has been voted one of the top three security podcasts multiple times. &lt;br /&gt;
&lt;br /&gt;
=== Professional Profile ===&lt;br /&gt;
Daniel Miessler is the Director of Advisory Services at IOActive and has 17 years of experience in information security. His background is in technical security testing and enterprise defense, including network, web, application, mobile, IoT testing, and adversary-based risk management. &lt;br /&gt;
&lt;br /&gt;
=== Online Presence ===&lt;br /&gt;
* [https://www.linkedin.com/in/danielmiessler/ Linkedin]&lt;br /&gt;
* [https://www.slideshare.net/danielmiessler/ Slideshare]&lt;br /&gt;
* [https://twitter.com/danielmiessler Twitter]&lt;br /&gt;
* [https://github.com/danielmiessler Github]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231689</id>
		<title>User:DanielMiessler</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231689"/>
				<updated>2017-07-14T13:23:26Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Daniel Miessler 2016.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= Daniel Miessler = &lt;br /&gt;
Daniel is the Director of Advisory Services at IOActive, and is the leader of the [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project OWASP IoT Security Project] and a leader on the [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Work ===&lt;br /&gt;
* Involved in OWASP for over 7 years&lt;br /&gt;
* Have lead multiple projects, including the OWASP Mobile Security Project, the Internet of Things Security Project, and the Game Security Project&lt;br /&gt;
* Regularly speak on Application Security at various conferences, including AppSec Cali in Santa Monica, CA&lt;br /&gt;
&lt;br /&gt;
=== Writing ===&lt;br /&gt;
* Writing at [https://danielmiessler.com/ danielmiessler.com] about information security, with particular focus on application security, since 1999. &lt;br /&gt;
* Featured in hundreds of articles, including for the BBC, Wall Street Journal, Forbes, Information Week, CSO, Fortune, Dark Reading, Threatpost, CNet, and many more. &lt;br /&gt;
* Recently authored [https://www.amazon.com/Real-Internet-Things-Daniel-Miessler-ebook/dp/B01NCLUA5T/ref=asap_bc?ie=UTF8 The Real Internet of Things], published in January of 2017. &lt;br /&gt;
&lt;br /&gt;
=== Podcast ===&lt;br /&gt;
* Produces the [https://danielmiessler.com/podcast/ Unsupervised Learning] podcast and newsletter, which has been voted one of the top three security podcasts multiple times. &lt;br /&gt;
&lt;br /&gt;
=== Professional Profile ===&lt;br /&gt;
Daniel Miessler is the Director of Advisory Services at IOActive and has 17 years of experience in information security. His background is in technical security testing and enterprise defense, including network, web, application, mobile, IoT testing, and adversary-based risk management. &lt;br /&gt;
&lt;br /&gt;
=== Online Presence ===&lt;br /&gt;
* [http://linkd.in/danielmiessler Linkedin]&lt;br /&gt;
* [https://www.slideshare.net/danielmiessler/ Slideshare]&lt;br /&gt;
* [https://twitter.com/danielmiessler Twitter]&lt;br /&gt;
* [https://github.com/danielmiessler Github]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231684</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231684"/>
				<updated>2017-07-14T13:09:13Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Dune73|Christian Folini]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Tanyajanca Tanya Janca]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Jeremy_Long Jeremy Long]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Makash|Akash Mahajan]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Tanyajanca Tanya Janca]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having been nominated for the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Nwhysel|Noreen Whysel]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Glenn &amp;amp; Riccardo ten Cate&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Jeremy_Long Jeremy Long]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:DanielMiessler|Daniel Miessler]]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231683</id>
		<title>User:DanielMiessler</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231683"/>
				<updated>2017-07-14T13:08:44Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Daniel Miessler 2016.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
= Daniel Miessler = &lt;br /&gt;
Daniel is the Director of Advisory Services at IOActive, and is the leader of the [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project OWASP IoT Security Project] and a leader on the [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Bangalore Work ===&lt;br /&gt;
* Chapter lead for [[Bangalore|OWASP Bangalore]] since 2012&lt;br /&gt;
* Since then OWASP Bangalore has conducted a meet at least once a month with average attendance of 60-70 people&lt;br /&gt;
* Multiple special meets, hands-on sessions, collaboration with groups like [https://infosecgirls.in/ InfosecGirls] to further increase outreach and spread awareness&lt;br /&gt;
&lt;br /&gt;
=== Talks and Evangelism for OWASP Bangalore ===&lt;br /&gt;
Gave talks at many technology companies around Application Security talking about OWASP Top 10, OWASP ASVS and other projects like&lt;br /&gt;
* Application Security in the time of Docker Containers at &lt;br /&gt;
** c0c0n 2016 Police Conference &lt;br /&gt;
** DevOpsDays Bangalore 2016&lt;br /&gt;
* Security Hardening with Ansible (Focus on A5 Security Misconfiguration) at&lt;br /&gt;
** All Day Dev Ops 2016&lt;br /&gt;
* How Attackers Work at&lt;br /&gt;
** Thoughtworks 2016&lt;br /&gt;
** SAP India 2015&lt;br /&gt;
** Phillips Innovation Campus 2015&lt;br /&gt;
* Building and Operating Secure Applications in The Cloud (Web and Mobile) at &lt;br /&gt;
** UNICOM    &lt;br /&gt;
** Microsoft Accelerator&lt;br /&gt;
** ISACA&lt;br /&gt;
* OWASP ZAP Automation using Python APIs at &lt;br /&gt;
** Open Source Conference 2016&lt;br /&gt;
* Communities Need Participation at&lt;br /&gt;
** OWASP Kerala (Through Video)&lt;br /&gt;
** Infosec Girls Meet-up&lt;br /&gt;
&lt;br /&gt;
=== Book Author - Burp Suite Essentials ===&lt;br /&gt;
Published by PacktPub November 2014, Listed as a reference by the creators of Burp Suite &lt;br /&gt;
&lt;br /&gt;
=== Professional Profile ===&lt;br /&gt;
An accomplished security professional with over a decade’s experience of providing specialist application and infrastructure consulting services at the highest levels to companies, governments, and organisations around the world. Deep experience of working with clients to provide innovative security insight that truly reflects the commercial and operational needs of the organisation from strategic advice to testing and analysis to incident response and recovery. An active participant in the international security community and conference speaker both individually, as chapter lead of the Bangalore chapter of OWASP the global organisation responsible for defining the standards for web application security and as a co-founder of null India’s largest open security community. &lt;br /&gt;
&lt;br /&gt;
== Online ==&lt;br /&gt;
* [http://linkd.in/webappsecguy Linkedin Profile]&lt;br /&gt;
* [http://www.slideshare.net/akashm/presentations Presentations on Slideshare]&lt;br /&gt;
* [https://twitter.com/makash @makash on Twitter]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231682</id>
		<title>User:DanielMiessler</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231682"/>
				<updated>2017-07-14T13:08:02Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Akash-Mahajan.png|alt=Akash Mahajan - OWASP Bangalore Chapter Lead|thumb|275x275px|[[File:Daniel Miessler 2016.png|thumb]]]]&lt;br /&gt;
&lt;br /&gt;
= Daniel Miessler = &lt;br /&gt;
Daniel is the Director of Advisory Services at IOActive, and is the leader of the [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project OWASP IoT Security Project] and a leader on the [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Bangalore Work ===&lt;br /&gt;
* Chapter lead for [[Bangalore|OWASP Bangalore]] since 2012&lt;br /&gt;
* Since then OWASP Bangalore has conducted a meet at least once a month with average attendance of 60-70 people&lt;br /&gt;
* Multiple special meets, hands-on sessions, collaboration with groups like [https://infosecgirls.in/ InfosecGirls] to further increase outreach and spread awareness&lt;br /&gt;
&lt;br /&gt;
=== Talks and Evangelism for OWASP Bangalore ===&lt;br /&gt;
Gave talks at many technology companies around Application Security talking about OWASP Top 10, OWASP ASVS and other projects like&lt;br /&gt;
* Application Security in the time of Docker Containers at &lt;br /&gt;
** c0c0n 2016 Police Conference &lt;br /&gt;
** DevOpsDays Bangalore 2016&lt;br /&gt;
* Security Hardening with Ansible (Focus on A5 Security Misconfiguration) at&lt;br /&gt;
** All Day Dev Ops 2016&lt;br /&gt;
* How Attackers Work at&lt;br /&gt;
** Thoughtworks 2016&lt;br /&gt;
** SAP India 2015&lt;br /&gt;
** Phillips Innovation Campus 2015&lt;br /&gt;
* Building and Operating Secure Applications in The Cloud (Web and Mobile) at &lt;br /&gt;
** UNICOM    &lt;br /&gt;
** Microsoft Accelerator&lt;br /&gt;
** ISACA&lt;br /&gt;
* OWASP ZAP Automation using Python APIs at &lt;br /&gt;
** Open Source Conference 2016&lt;br /&gt;
* Communities Need Participation at&lt;br /&gt;
** OWASP Kerala (Through Video)&lt;br /&gt;
** Infosec Girls Meet-up&lt;br /&gt;
&lt;br /&gt;
=== Book Author - Burp Suite Essentials ===&lt;br /&gt;
Published by PacktPub November 2014, Listed as a reference by the creators of Burp Suite &lt;br /&gt;
&lt;br /&gt;
=== Professional Profile ===&lt;br /&gt;
An accomplished security professional with over a decade’s experience of providing specialist application and infrastructure consulting services at the highest levels to companies, governments, and organisations around the world. Deep experience of working with clients to provide innovative security insight that truly reflects the commercial and operational needs of the organisation from strategic advice to testing and analysis to incident response and recovery. An active participant in the international security community and conference speaker both individually, as chapter lead of the Bangalore chapter of OWASP the global organisation responsible for defining the standards for web application security and as a co-founder of null India’s largest open security community. &lt;br /&gt;
&lt;br /&gt;
== Online ==&lt;br /&gt;
* [http://linkd.in/webappsecguy Linkedin Profile]&lt;br /&gt;
* [http://www.slideshare.net/akashm/presentations Presentations on Slideshare]&lt;br /&gt;
* [https://twitter.com/makash @makash on Twitter]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Daniel_Miessler_2016.png&amp;diff=231681</id>
		<title>File:Daniel Miessler 2016.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Daniel_Miessler_2016.png&amp;diff=231681"/>
				<updated>2017-07-14T13:06:26Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Daniel Miessler 2016&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231680</id>
		<title>User:DanielMiessler</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:DanielMiessler&amp;diff=231680"/>
				<updated>2017-07-14T13:01:57Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: Base of page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Akash-Mahajan.png|alt=Akash Mahajan - OWASP Bangalore Chapter Lead|thumb|275x275px|Akash Mahajan - OWASP Bangalore Chapter Lead]]&lt;br /&gt;
&lt;br /&gt;
= Akash Mahajan = &lt;br /&gt;
Akash is the founder and community Manager at ''null – The Open Security Group'' and ''Chapter Lead'' at [https://www.owasp.org/index.php/Bangalore OWASP Bangalore] while founding Appsecco a specialist application security company. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Bangalore Work ===&lt;br /&gt;
* Chapter lead for [[Bangalore|OWASP Bangalore]] since 2012&lt;br /&gt;
* Since then OWASP Bangalore has conducted a meet at least once a month with average attendance of 60-70 people&lt;br /&gt;
* Multiple special meets, hands-on sessions, collaboration with groups like [https://infosecgirls.in/ InfosecGirls] to further increase outreach and spread awareness&lt;br /&gt;
&lt;br /&gt;
=== Talks and Evangelism for OWASP Bangalore ===&lt;br /&gt;
Gave talks at many technology companies around Application Security talking about OWASP Top 10, OWASP ASVS and other projects like&lt;br /&gt;
* Application Security in the time of Docker Containers at &lt;br /&gt;
** c0c0n 2016 Police Conference &lt;br /&gt;
** DevOpsDays Bangalore 2016&lt;br /&gt;
* Security Hardening with Ansible (Focus on A5 Security Misconfiguration) at&lt;br /&gt;
** All Day Dev Ops 2016&lt;br /&gt;
* How Attackers Work at&lt;br /&gt;
** Thoughtworks 2016&lt;br /&gt;
** SAP India 2015&lt;br /&gt;
** Phillips Innovation Campus 2015&lt;br /&gt;
* Building and Operating Secure Applications in The Cloud (Web and Mobile) at &lt;br /&gt;
** UNICOM    &lt;br /&gt;
** Microsoft Accelerator&lt;br /&gt;
** ISACA&lt;br /&gt;
* OWASP ZAP Automation using Python APIs at &lt;br /&gt;
** Open Source Conference 2016&lt;br /&gt;
* Communities Need Participation at&lt;br /&gt;
** OWASP Kerala (Through Video)&lt;br /&gt;
** Infosec Girls Meet-up&lt;br /&gt;
&lt;br /&gt;
=== Book Author - Burp Suite Essentials ===&lt;br /&gt;
Published by PacktPub November 2014, Listed as a reference by the creators of Burp Suite &lt;br /&gt;
&lt;br /&gt;
=== Professional Profile ===&lt;br /&gt;
An accomplished security professional with over a decade’s experience of providing specialist application and infrastructure consulting services at the highest levels to companies, governments, and organisations around the world. Deep experience of working with clients to provide innovative security insight that truly reflects the commercial and operational needs of the organisation from strategic advice to testing and analysis to incident response and recovery. An active participant in the international security community and conference speaker both individually, as chapter lead of the Bangalore chapter of OWASP the global organisation responsible for defining the standards for web application security and as a co-founder of null India’s largest open security community. &lt;br /&gt;
&lt;br /&gt;
== Online ==&lt;br /&gt;
* [http://linkd.in/webappsecguy Linkedin Profile]&lt;br /&gt;
* [http://www.slideshare.net/akashm/presentations Presentations on Slideshare]&lt;br /&gt;
* [https://twitter.com/makash @makash on Twitter]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227837</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227837"/>
				<updated>2017-03-23T17:46:36Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Collaboration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Exploits =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Exploits ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might use to take advantage of a given bug within the game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Exploit&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''DDoS'''&lt;br /&gt;
|Force a player to DC, or attack the game itself so that it cannot serve customers.&lt;br /&gt;
|- &lt;br /&gt;
| '''Client Modification'''&lt;br /&gt;
|Modify the client in a way that gives advantage.&lt;br /&gt;
|- &lt;br /&gt;
| '''Malicious Macros'''&lt;br /&gt;
|Implementation of macros that perform unwanted actions.&lt;br /&gt;
|- &lt;br /&gt;
| '''Social Engineering'''&lt;br /&gt;
|Getting a player, mod, or game staff member to perform an action that helps the attacker.&lt;br /&gt;
|- &lt;br /&gt;
| '''Use Physics Bug'''&lt;br /&gt;
|Interact with the world in a way that makes the physics engine do what the attacker wants.&lt;br /&gt;
|-&lt;br /&gt;
|'''Malform Network Traffic'''&lt;br /&gt;
|Send modified network traffic that tricks or disrupts an opposing player or the game itself.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== The Exploits Project ==&lt;br /&gt;
&lt;br /&gt;
The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|'''Skip Content'''&lt;br /&gt;
|Allows player to skip content resuting in a faster completion or objective time&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Defenses ==&lt;br /&gt;
These are some of the common defenses that can be used to counter attacks against various components of a game.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Cryptographic Validation of Client'''&lt;br /&gt;
|Ensure that the client will not run if it has been modified.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enterprise-level DDoS Protection'''&lt;br /&gt;
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.&lt;br /&gt;
|- &lt;br /&gt;
| '''Basic Application Security Defenses'''&lt;br /&gt;
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Lockouts'''&lt;br /&gt;
|Lock out a user's account after a certain number of failed attempts.&lt;br /&gt;
|-&lt;br /&gt;
|'''Two-factor Authentication'''&lt;br /&gt;
|Require use of 2FA on a given player's account.&lt;br /&gt;
|-&lt;br /&gt;
|'''Better Code'''&lt;br /&gt;
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.&lt;br /&gt;
|-&lt;br /&gt;
|'''Server-side Validation'''&lt;br /&gt;
|Ensure that validations are performed on the server and not (only) the client.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227835</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227835"/>
				<updated>2017-03-23T17:40:17Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|'''Skip Content'''&lt;br /&gt;
|Allows player to skip content resuting in a faster completion or objective time&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|'''Skip Content'''&lt;br /&gt;
|Allows player to skip content resuting in a faster completion or objective time&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Defenses ==&lt;br /&gt;
These are some of the common defenses that can be used to counter attacks against various components of a game.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Cryptographic Validation of Client'''&lt;br /&gt;
|Ensure that the client will not run if it has been modified.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enterprise-level DDoS Protection'''&lt;br /&gt;
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.&lt;br /&gt;
|- &lt;br /&gt;
| '''Basic Application Security Defenses'''&lt;br /&gt;
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Lockouts'''&lt;br /&gt;
|Lock out a user's account after a certain number of failed attempts.&lt;br /&gt;
|-&lt;br /&gt;
|'''Two-factor Authentication'''&lt;br /&gt;
|Require use of 2FA on a given player's account.&lt;br /&gt;
|-&lt;br /&gt;
|'''Better Code'''&lt;br /&gt;
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.&lt;br /&gt;
|-&lt;br /&gt;
|'''Server-side Validation'''&lt;br /&gt;
|Ensure that validations are performed on the server and not (only) the client.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227831</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227831"/>
				<updated>2017-03-23T17:02:40Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|'''Skip Content'''&lt;br /&gt;
|Allows player to skip content resuting in a faster completion or objective time&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Defenses ==&lt;br /&gt;
These are some of the common defenses that can be used to counter attacks against various components of a game.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Cryptographic Validation of Client'''&lt;br /&gt;
|Ensure that the client will not run if it has been modified.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enterprise-level DDoS Protection'''&lt;br /&gt;
|Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.&lt;br /&gt;
|- &lt;br /&gt;
| '''Basic Application Security Defenses'''&lt;br /&gt;
|Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Lockouts'''&lt;br /&gt;
|Lock out a user's account after a certain number of failed attempts.&lt;br /&gt;
|-&lt;br /&gt;
|'''Two-factor Authentication'''&lt;br /&gt;
|Require use of 2FA on a given player's account.&lt;br /&gt;
|-&lt;br /&gt;
|'''Better Code'''&lt;br /&gt;
|Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.&lt;br /&gt;
|-&lt;br /&gt;
|'''Server-side Validation'''&lt;br /&gt;
|Ensure that validations are performed on the server and not (only) the client.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227823</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227823"/>
				<updated>2017-03-23T15:04:36Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Common Game Security Defenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227822</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227822"/>
				<updated>2017-03-23T15:03:24Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227820</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227820"/>
				<updated>2017-03-23T14:53:21Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227818</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227818"/>
				<updated>2017-03-23T07:54:07Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227817</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227817"/>
				<updated>2017-03-23T07:42:35Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible technical or tactical outcomes that can occur as the result of someone attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227816</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227816"/>
				<updated>2017-03-23T07:40:37Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Technical Impacts ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible technical or tactical outcomes that can occur as the result of someone attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227815</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227815"/>
				<updated>2017-03-23T07:39:15Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Technical Impacts ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible technical or tactical outcomes that can occur as the result of someone attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227814</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227814"/>
				<updated>2017-03-23T05:15:04Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Technical Impacts ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible technical or tactical outcomes that can occur as the result of someone attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227813</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227813"/>
				<updated>2017-03-23T05:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Collaboration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227812</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227812"/>
				<updated>2017-03-23T04:37:04Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Collaboration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227811</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227811"/>
				<updated>2017-03-23T04:32:17Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227810</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227810"/>
				<updated>2017-03-23T04:31:22Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227809</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227809"/>
				<updated>2017-03-23T04:30:50Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Attack Surfaces */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227808</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227808"/>
				<updated>2017-03-23T04:30:11Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Vulnerabilities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227791</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227791"/>
				<updated>2017-03-22T20:28:10Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227790</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227790"/>
				<updated>2017-03-22T19:15:07Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Common Game Security Defenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template''&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227783</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227783"/>
				<updated>2017-03-22T19:05:22Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: Updating tab names.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Technical Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Business Impacts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface), which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability), which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal), ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227778</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227778"/>
				<updated>2017-03-22T17:57:26Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Collaboration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface), which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability), which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal), ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226398</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226398"/>
				<updated>2017-02-15T19:28:21Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Medical Device Testing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226397</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226397"/>
				<updated>2017-02-15T19:27:19Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Medical Device Testing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Failure States'''&lt;br /&gt;
|&lt;br /&gt;
* DoS&lt;br /&gt;
* Sensor failure reactions&lt;br /&gt;
* Detecting malfunctioning sensors&lt;br /&gt;
* Subsystem failure logic&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226396</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226396"/>
				<updated>2017-02-15T19:23:53Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Medical Device Testing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Failure States'''&lt;br /&gt;
|&lt;br /&gt;
* DoS&lt;br /&gt;
* Sensor failure reactions&lt;br /&gt;
* Detecting malfunctioning sensors&lt;br /&gt;
* Subsystem failure logic&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226395</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226395"/>
				<updated>2017-02-15T19:20:50Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Medical Device Testing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Failure States'''&lt;br /&gt;
|&lt;br /&gt;
* DoS&lt;br /&gt;
* Sensor failure reactions&lt;br /&gt;
* Detecting malfunctioning sensors&lt;br /&gt;
* Subsystem failure logic&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226394</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226394"/>
				<updated>2017-02-15T19:16:44Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Medical Device Attack Surfaces */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Attack Surfaces project is intended to provide some basic guidelines around the types of areas that need to be secured before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226393</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226393"/>
				<updated>2017-02-15T17:06:54Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Attack Surfaces project is intended to provide some basic guidelines around the types of areas that need to be secured before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Backdoor keys / tokens&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Data in Transit&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226301</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226301"/>
				<updated>2017-02-13T21:03:03Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Attack Surfaces project is intended to provide some basic guidelines around the types of areas that need to be secured before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Backdoor keys / tokens&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225301</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225301"/>
				<updated>2017-01-18T02:18:15Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225298</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225298"/>
				<updated>2017-01-18T01:00:15Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Game Security Vulnerabilities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225242</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225242"/>
				<updated>2017-01-17T05:43:35Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225240</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225240"/>
				<updated>2017-01-17T05:43:16Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225236</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225236"/>
				<updated>2017-01-17T05:34:17Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225234</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225234"/>
				<updated>2017-01-17T05:33:41Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225233</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225233"/>
				<updated>2017-01-17T05:30:55Z</updated>
		
		<summary type="html">&lt;p&gt;Daniel Miessler: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Daniel Miessler</name></author>	</entry>

	</feed>