<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jason+Haddix</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jason+Haddix"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jason_Haddix"/>
		<updated>2026-05-06T13:00:00Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227827</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227827"/>
				<updated>2017-03-23T15:20:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|'''Skip Content'''&lt;br /&gt;
|Allows player to skip content resuting in a faster completion or objective time&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Outcomes&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|-&lt;br /&gt;
|'''Lost Revenue'''&lt;br /&gt;
|The game company loses revenue due to bugs, hacks, and player anger.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227821</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227821"/>
				<updated>2017-03-23T15:01:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; , which could have been prevented by &amp;lt;code&amp;gt;DEFENSE.&amp;lt;/code&amp;gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
* Matt Espinoza&lt;br /&gt;
* Chad Lynch&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* January, 2017: Doing a complete redesign of the project.&lt;br /&gt;
* March 2017: Presenting version 1.0 at HouSecCon 2017.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|'''Game Mechanics'''&lt;br /&gt;
|The physics engine, logic, and other environmental components within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Attacker Goals ==&lt;br /&gt;
&lt;br /&gt;
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attacker Goal&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Avoid Damage'''&lt;br /&gt;
|Allows the player to avoid being killed by other players or NPCs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain Gear'''&lt;br /&gt;
|Improve the amount or quality of gear the player has.&lt;br /&gt;
|- &lt;br /&gt;
| '''Gain In-game Currency'''&lt;br /&gt;
|Gain more currency than would normally be allowed.&lt;br /&gt;
|- &lt;br /&gt;
| '''Enhance Gear'''&lt;br /&gt;
|Give weapons or other gear powers that they wouldn't normally have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Take Opponent Offline'''&lt;br /&gt;
|Take a player out of the game so that the attacker's position is improved.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attacker Goals Project ==&lt;br /&gt;
&lt;br /&gt;
The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.&lt;br /&gt;
&lt;br /&gt;
== Sub-project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Negative Outcomes ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Technical Impact&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Currency Magnification'''&lt;br /&gt;
|A player ends up with more currency than they were supposed to have.&lt;br /&gt;
|- &lt;br /&gt;
| '''Player Anger'''&lt;br /&gt;
|Players become extremely agitated by one or more bugs.&lt;br /&gt;
|- &lt;br /&gt;
| '''Players Stop Playing the Game'''&lt;br /&gt;
|Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Invulnerable Positions'''&lt;br /&gt;
|Locations on the map make bases or players unassailable and therefore invulnerable.&lt;br /&gt;
|- &lt;br /&gt;
| '''Item Multiplication'''&lt;br /&gt;
|Items are duplicated, multiplied, or otherwise increased in an unintended way.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unfair Ladder Victory'''&lt;br /&gt;
|A victory is scored in favor of a player or team when they should not have won.&lt;br /&gt;
|-&lt;br /&gt;
|'''Unauthorized Admin Command Use'''&lt;br /&gt;
|Regular users are somehow able to execute administrative commands.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Negative Outcomes Project? ==&lt;br /&gt;
&lt;br /&gt;
The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!ID&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Techical Impact&lt;br /&gt;
!Business Impact&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
!Game&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
|V1&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger&lt;br /&gt;
|Players leave, Lost Revenue&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
|&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|VN1&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating, which could have been prevented by &amp;lt;code&amp;gt;CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT&amp;lt;/code&amp;gt;”&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Working Data Collection Spreadsheet:''&lt;br /&gt;
&lt;br /&gt;
https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0&lt;br /&gt;
&lt;br /&gt;
: &lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
We are actively looking for people to help in the following areas:&lt;br /&gt;
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.&lt;br /&gt;
* Adding content to any of the various sections&lt;br /&gt;
* Input from avid gamers on how useful this is to them&lt;br /&gt;
* Input from app security experts&lt;br /&gt;
* Input from security types working at gaming companies&lt;br /&gt;
* Input from game company business types&lt;br /&gt;
If you have interest in helping, reach out to us and we'll make you a contributor.&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227730</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227730"/>
				<updated>2017-03-21T05:50:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
* Tom Simkovic&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface), which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability), which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal), ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227729</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=227729"/>
				<updated>2017-03-21T05:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* Kevin Hemmingsen&lt;br /&gt;
* Troy Cunefare&lt;br /&gt;
* Ryan Lawrence&lt;br /&gt;
* Martin Mendoza&lt;br /&gt;
* Koray Algan&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface), which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability), which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal), ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225927</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225927"/>
				<updated>2017-02-03T01:16:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* OWASP Game Security Framework (GSF) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles.&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface), which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability), which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal), ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225302</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225302"/>
				<updated>2017-01-18T02:48:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
== Real-world Examples of Gaming Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
''Vulnerability 1''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; style=&amp;quot;text-align: center;&amp;quot; | The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface), which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability), which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal), ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating.&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
''Template 1''&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225300</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225300"/>
				<updated>2017-01-18T02:14:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* What is the OWASP Game Security Framework? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* QA&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225299</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225299"/>
				<updated>2017-01-18T02:14:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability Name&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Vulnerabilty Name&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Surface Area&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Attacker Goal&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Negative Outcome&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Tester Tool&lt;br /&gt;
! style=&amp;quot;font-weight: bold;&amp;quot; | Defense&lt;br /&gt;
! Ref&lt;br /&gt;
! Genre&lt;br /&gt;
|-&lt;br /&gt;
| Local Resource Modification, Client-side Logic Flaw&lt;br /&gt;
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap.&lt;br /&gt;
| Game Client&lt;br /&gt;
| Unfair Player Advantage&lt;br /&gt;
| Player Anger, Lost Revenue&lt;br /&gt;
| Game Client&lt;br /&gt;
| Cryptographic Integrity Checks on Game Client&lt;br /&gt;
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/&lt;br /&gt;
| 3PS/1PS/MMO&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225297</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225297"/>
				<updated>2017-01-18T00:55:34Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Defenses =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Common Game Security Defenses ==&lt;br /&gt;
&lt;br /&gt;
Table Here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225296</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225296"/>
				<updated>2017-01-18T00:49:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
== Commonly Used Game Hacking Tools ==&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225295</id>
		<title>OWASP Game Security Framework Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Game_Security_Framework_Project&amp;diff=225295"/>
				<updated>2017-01-18T00:46:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About the Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Game Security Framework (GSF)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''The framework is broken into three main concepts / sections:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Components include the following:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.&lt;br /&gt;
&lt;br /&gt;
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.&lt;br /&gt;
&lt;br /&gt;
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;The attacker attacked and edited the &amp;lt;code&amp;gt;LOCAL GAME CLIENT (Attack Surface)&amp;lt;/code&amp;gt;,  which had a &amp;lt;code&amp;gt;LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)&amp;lt;/code&amp;gt;, which allowed her to &amp;lt;code&amp;gt;ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)&amp;lt;/code&amp;gt;, ultimately leading to an &amp;lt;code&amp;gt;UNHAPPY PLAYER BASE (Negative Outcome)&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;DECLINING GAME REVENUE (Negative Outcome)&amp;lt;/code&amp;gt; due to cheating.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using this structure, security testers can clearly communicate the various 	aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Game Security Framework? ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.&lt;br /&gt;
&lt;br /&gt;
The target audience for the project includes:&lt;br /&gt;
&lt;br /&gt;
* Gamers&lt;br /&gt;
* Game designers&lt;br /&gt;
* Penetration testers&lt;br /&gt;
* Gaming executives&lt;br /&gt;
* Anyone else with a vested interest in game security&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* LFG&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
COMING SOON&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* ''[JANUARY 2017]'' Doing a complete redesign of the project.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Attack Surfaces =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Attack Surfaces ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the attack surfaces that can be found in video games of various types.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* The locally running game client that is accessible to the gamer because it's running on his/her machine.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* The network which game traffic traverses in order to reach the game's server or peers who are playing the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* The game server that is hosting the instance that gamers connect to in order to play the game.&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* The economic system that exists within the game.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Attack Surfaces Section? ==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Game Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Attacker Goals =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Negative Outcomes =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Examples =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Game Security Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Description&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Game Client'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to edit in-game resources&lt;br /&gt;
* Ability to bypass license requirement&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Network Denial of Service (player)&lt;br /&gt;
** Player bandwidth exhaustion&lt;br /&gt;
** Player game client resource exhaustion&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Application Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Player)&lt;br /&gt;
** Player application logic Denial of Service&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Server'''&lt;br /&gt;
|&lt;br /&gt;
* Application Level Denial of Service (Server)&lt;br /&gt;
** Server application logic Denial of Service&lt;br /&gt;
* Ability to modify game ladder rankings&lt;br /&gt;
* Ability to modify own player resources&lt;br /&gt;
|- &lt;br /&gt;
| '''Game Economy'''&lt;br /&gt;
|&lt;br /&gt;
* Ability to generate unlimited money on client side&lt;br /&gt;
* Ability to generate unlimited money through network/application traffic modification&lt;br /&gt;
* Ability to modify prices for in-game items&lt;br /&gt;
* Ability to replay financial actions such as buying or selling through network/application manipulation&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Game Security Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://game-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Testing Tools =&lt;br /&gt;
&lt;br /&gt;
TABLE HERE&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs&amp;diff=224054</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/VMs</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs&amp;diff=224054"/>
				<updated>2016-12-11T06:55:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore ]&lt;br /&gt;
| ISO&lt;br /&gt;
| [http://www.badstore.net/register.htm download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/bee-box/ Bee-Box ]&lt;br /&gt;
| bWAPP VMware&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/ProjectSummary Broken Web Applications Project (BWA) ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/Downloads download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/ Drunk Admin Web Hacking Challenge ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://bechtsoudis.com/data/challenges/drunk_admin_hacking_challenge.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/projects/vuln-web-app/ Exploit.co.il Vuln Web App ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/exploitcoilvuln/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/ GameOver ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl Hackxor ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/hackxor/files/ download] [http://hackxor.sourceforge.net/cgi-bin/hints.pl hints&amp;amp;amp;tips]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://ninja-sec.com/index.php/hacme-bank-prebuilt-vmware-image-ninja-sec-com/ Hacme Bank Prebuilt&amp;amp;nbsp;VM ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://dc121.4shared.com/download/wwPhUxMQ/hackme_bank_vm_Ninja-Sec.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.kioptrix.com/blog/?p=604 Kioptrix4 ]&lt;br /&gt;
| VMware &amp;amp;amp; Hyper-V&lt;br /&gt;
| [http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LAMPSecurity ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/files/ download] [http://sourceforge.net/projects/lampsecurity/files/Documentation/ doc]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://community.rapid7.com/docs/DOC-1875 Metasploitable 2 ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities Metasploitable 3 ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [https://github.com/rapid7/metasploitable3 download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bonsai-sec.com/en/research/moth.php Moth ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/w3af/files/moth/moth/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pentesterlab.com/exercises/ PentesterLab&amp;amp;nbsp;- The Exercises ]&lt;br /&gt;
| ISO &amp;amp;amp; PDF&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://phdays.blogspot.com.es/2012/05/once-again-about-remote-banking.html PHDays I-Bank ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://downloads.phdays.com/phdays_ibank_vm.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.samurai-wtf.org/ Samurai WTF ]&lt;br /&gt;
| ISO - list&lt;br /&gt;
| [http://sourceforge.net/projects/samurai/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.gracefulsecurity.com/vulnvm/ Seattle Sounds - Graceful’s VulnVM]&lt;br /&gt;
| &lt;br /&gt;
| [https://www.gracefulsecurity.com/Seattle-0.0.5.7z download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sg6-labs.blogspot.com/2007/12/secgame-1-sauron.html Sauron&amp;amp;nbsp;]&lt;br /&gt;
| Quemu&lt;br /&gt;
| [http://sg6-labs.blogspot.com/search/label/SecGame solutions]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/ Virtual Hacking Lab ]&lt;br /&gt;
| ZIP&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/web_security_dojo/ Web Security Dojo ]&lt;br /&gt;
| VMware, VirtualBox&lt;br /&gt;
| [http://sourceforge.net/projects/websecuritydojo/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.ethicalhack3r.co.uk/wordpress-cd/ WordPress CD]&lt;br /&gt;
| VirtualBox&lt;br /&gt;
| [http://www.ethicalhack3r.co.uk/wpcd/WPCD.ova download]&lt;br /&gt;
| ethicalhack3r&lt;br /&gt;
| [http://www.randomstorm.com/wpscan-security-tool.php WPScan]&lt;br /&gt;
|-&lt;br /&gt;
| [http://xxe.sourceforge.net/ XXE ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/xxe/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224053</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224053"/>
				<updated>2016-12-11T06:54:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/CSPF-Founder/btslab/ btslab]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Includes flash-based xss, SSRF, and SSI&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ Damn Vulnerable Node Application - DVNA ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ download]&lt;br /&gt;
| Claudio Lacayo&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Service - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas (depriciated?)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/snoopysecurity/dvws Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| snoopysecurity&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/secvulture/dvta Damn Vulnerable Thick Client App - DVTA ]&lt;br /&gt;
| C# .NET&lt;br /&gt;
| &lt;br /&gt;
| secvulture&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/rapid7/hackazon Hackazon]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Rapid7&lt;br /&gt;
| Has some REST and new-school web components.&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Juice_Shop_Project Juice Shop]&lt;br /&gt;
| Node/JS&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project NodeGoat ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/OWASP/NodeGoat git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sqlmapproject/testenv SQL injection test environment]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| SQLmap Project&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sectooladdict/wavsep WAVSEP - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/wavsep/ download (builds)] [https://code.google.com/p/wavsep/downloads/list download (old)] [https://github.com/sectooladdict/wavsep/wiki wiki]&lt;br /&gt;
| Shay Chen&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/WebGoatPHP WebGoatPHP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/OWASP/OWASPWebGoatPHP download] [https://github.com/OWASP/OWASPWebGoatPHP/blob/master/README.md guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa Xtreme Vulnerable Web Application (XVWA)]&lt;br /&gt;
| PHP/MySQL&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa download]&lt;br /&gt;
| @s4n7h0, @samanL33T&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224052</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224052"/>
				<updated>2016-12-11T06:44:21Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/CSPF-Founder/btslab/ btslab]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Includes flash-based xss, SSRF, and SSI&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ Damn Vulnerable Node Application - DVNA ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ download]&lt;br /&gt;
| Claudio Lacayo&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Service - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas (depriciated?)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/snoopysecurity/dvws Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| snoopysecurity&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/secvulture/dvta Damn Vulnerable Thick Client App - DVTA ]&lt;br /&gt;
| C# .NET&lt;br /&gt;
| &lt;br /&gt;
| secvulture&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/rapid7/hackazon Hackazon]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Rapid7&lt;br /&gt;
| Has some REST and new-school web components.&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Juice_Shop_Project Juice Shop]&lt;br /&gt;
| Node/JS&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project NodeGoat ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/OWASP/NodeGoat git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.gracefulsecurity.com/vulnvm/ Seattle Sounds - Graceful’s VulnVM]&lt;br /&gt;
| &lt;br /&gt;
| [https://www.gracefulsecurity.com/Seattle-0.0.5.7z]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sqlmapproject/testenv SQL injection test environment]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| SQLmap Project&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sectooladdict/wavsep WAVSEP - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/wavsep/ download (builds)] [https://code.google.com/p/wavsep/downloads/list download (old)] [https://github.com/sectooladdict/wavsep/wiki wiki]&lt;br /&gt;
| Shay Chen&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/WebGoatPHP WebGoatPHP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/OWASP/OWASPWebGoatPHP download] [https://github.com/OWASP/OWASPWebGoatPHP/blob/master/README.md guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa Xtreme Vulnerable Web Application (XVWA)]&lt;br /&gt;
| PHP/MySQL&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa download]&lt;br /&gt;
| @s4n7h0, @samanL33T&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224047</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224047"/>
				<updated>2016-12-10T17:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/CSPF-Founder/btslab/ btslab]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Includes flash-based xss, SSRF, and SSI&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ Damn Vulnerable Node Application - DVNA ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ download]&lt;br /&gt;
| Claudio Lacayo&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/rapid7/hackazon Hackazon]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Rapid7&lt;br /&gt;
| Has some REST and new-school web components.&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Juice_Shop_Project Juice Shop]&lt;br /&gt;
| Node/JS&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project NodeGoat ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/OWASP/NodeGoat git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sqlmapproject/testenv SQL injection test environment]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| SQLmap Project&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sectooladdict/wavsep WAVSEP - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/wavsep/ download (builds)] [https://code.google.com/p/wavsep/downloads/list download (old)] [https://github.com/sectooladdict/wavsep/wiki wiki]&lt;br /&gt;
| Shay Chen&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/WebGoatPHP WebGoatPHP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/OWASP/OWASPWebGoatPHP download] [https://github.com/OWASP/OWASPWebGoatPHP/blob/master/README.md guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa Xtreme Vulnerable Web Application (XVWA)]&lt;br /&gt;
| PHP/MySQL&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa download]&lt;br /&gt;
| @s4n7h0, @samanL33T&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224046</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=224046"/>
				<updated>2016-12-10T17:31:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/CSPF-Founder/btslab/ btslab]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Includes flash-based xss, SSRF, and SSI&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ Damn Vulnerable Node Application - DVNA ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ download]&lt;br /&gt;
| Claudio Lacayo&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Juice_Shop_Project Juice Shop]&lt;br /&gt;
| Node/JS&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project NodeGoat ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/OWASP/NodeGoat git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sqlmapproject/testenv SQL injection test environment]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| SQLmap Project&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sectooladdict/wavsep WAVSEP - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/wavsep/ download (builds)] [https://code.google.com/p/wavsep/downloads/list download (old)] [https://github.com/sectooladdict/wavsep/wiki wiki]&lt;br /&gt;
| Shay Chen&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/WebGoatPHP WebGoatPHP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/OWASP/OWASPWebGoatPHP download] [https://github.com/OWASP/OWASPWebGoatPHP/blob/master/README.md guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa Xtreme Vulnerable Web Application (XVWA)]&lt;br /&gt;
| PHP/MySQL&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa download]&lt;br /&gt;
| @s4n7h0, @samanL33T&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jason_Haddix&amp;diff=224045</id>
		<title>User:Jason Haddix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jason_Haddix&amp;diff=224045"/>
				<updated>2016-12-10T17:27:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Jason Haddix is a security researcher and consultant. Jason is the former the Director of Penetration Testing at Hewlett-Packard and Fortify Software and now works as the Head of Trust and Security at Bugcrowd. Jason performs and trains internal candidates on mobile penetration testing, black box web application auditing, network/infrastructural security assessments, cursory mainframe security analysis, cloud architecture reviews, wireless &lt;br /&gt;
network assessment, binary reverse engineering, and static analysis. He is also a semi-regular player on the capture the flag team Shellphish, an academic hacking group based out of the University of California, Santa Barbara.&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=196557</id>
		<title>Testing for Cross site scripting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=196557"/>
				<updated>2015-06-24T21:39:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* Related Security Activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Cross-site Scripting (XSS)]] attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===Description of Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the OWASP articles on [[Cross-site Scripting (XSS)]] Vulnerabilities and [[DOM Based XSS]].&lt;br /&gt;
&lt;br /&gt;
===How to Avoid Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Guide]] article on [[Phishing|Phishing]].&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for Cross-site scripting|Reviewing code for Cross-site scripting]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===XSS Filter Evasion Cheat Sheet===&lt;br /&gt;
&lt;br /&gt;
The [[XSS Filter Evasion Cheat Sheet]] is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
[[Category:FIXME|I think this whole section needs to be deleted]]&lt;br /&gt;
&lt;br /&gt;
[[XSS]] attacks are essentially code injection attacks into the various interpreters in the browser. These attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash, and other client-side languages. These attacks also have the ability to gather data from account hijacking, changing of user settings, cookie theft/poisoning, or false advertising is possible. In some cases, Cross Site Scripting vulnerabilities can perform other functions such as scanning for other vulnerabilities and performing a Denial of Service on your web server.&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is an attack on the privacy of clients of a particular web site which can lead to a total breach of security when customer details are stolen or manipulated. Unlike most attacks, which involve two parties (the attacker and the web site, or the attacker and the victim client) the XSS attack involves three parties -- the attacker, a client and the web site. The goal of the XSS attack is to steal the client cookies or any other sensitive information which can authenticate the client to the web site. With the token of the legitimate user at hand, the attacker can proceed to act as the user in his/her interaction with the site, impersonating the user - Identity theft!&lt;br /&gt;
&lt;br /&gt;
Online message boards, web logs, guestbooks, and user forums where messages can be permanently stored also facilitate Cross Site Scripting attacks. In these cases, an attacker can post a message to the board with a link to a seemingly harmless site, which subtly encodes a script that attacks the user once they click the link. Attackers can use a wide range of encoding techniques to hide or obfuscate the malicious script and, in some cases, can avoid explicit use of the &amp;lt;Script&amp;gt; tag. Typically, XSS attacks involve malicious JavaScript, but they can also involve any type of executable active content. Although the types of attacks vary in sophistication, there is a generally reliable method to detect XSS vulnerabilities. Cross Site Scripting is used in many Phishing attacks.&lt;br /&gt;
&lt;br /&gt;
'''Now we explain the three types of Cross Site Scripting: Stored, Reflected, and DOM-Based.'''&lt;br /&gt;
&lt;br /&gt;
The '''Stored Cross Site Scripting''' vulnerability is the most powerful kind of XSS attack. A Stored XSS vulnerability exists when data provided to a web application by a user is first stored persistently on the server (in a database, filesystem, or other location), and later displayed to users in a web page without being encoded using HTML entity encoding. A real life example of this would be the Samy MySpace Worm, which exploited an XSS vulnerability found on MySpace in October of 2005.&lt;br /&gt;
&lt;br /&gt;
These vulnerabilities are the most significant of the XSS types because an attacker can inject the script just once. This could potentially hit a large number of other users with little need for social engineering, or the web application could even be infected by a cross-site scripting virus.&lt;br /&gt;
&lt;br /&gt;
'''Example'''&lt;br /&gt;
&lt;br /&gt;
If we have a site that permits us to leave a message to the other user (a lesson of WebGoat v3.7), and we inject a script insted of a message in the following way:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:XSSStored1.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now the server will store this information and when a user clicks on our fake message, his browser will execute our script as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:XSSStored2.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The '''Reflected Cross-Site Scripting''' vulnerability is by far the most common and well-known type. These holes show up when data provided by a web client is used immediately by server-side scripts to generate a page of results for that user. If unvalidated user-supplied data is included in the resulting page without HTML encoding, this will allow client-side code to be injected into the dynamic page. A classic example of this is in site search engines: if one searches for a string which includes some HTML special characters, often the search string will be redisplayed on the result page to indicate what was searched for, or will at least include the search terms in the text box for easier editing. If all occurrences of the search terms are not HTML entity encoded, an XSS hole will result.&lt;br /&gt;
&lt;br /&gt;
At first glance, this does not appear to be a serious problem since users can only inject code into their own pages. However, with a small amount of social engineering, an attacker could convince a user to follow a malicious URL which injects code into the results page, giving the attacker full access to that page's content. Due to the general requirement of the use of some social engineering in this case (and normally in DOM-Based XSS vulnerabilities as well), many programmers have disregarded these holes as not terribly important. This misconception is sometimes applied to XSS holes in general (even though this is only one type of XSS) and there is often disagreement in the security community as to the importance of cross-site scripting vulnerabilities. The simplest way to show the importance of a XSS vulnerability would be to perform a Denial of Service attack.&lt;br /&gt;
In some cases a Denial of Service attack can be performed on the server by doing the following:      &lt;br /&gt;
&lt;br /&gt;
 article.php?title=&amp;lt;meta%20http-equiv=&amp;quot;refresh&amp;quot;%20content=&amp;quot;0;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This makes a refresh request roughly about every .3 seconds to particular page. It then acts like an infinite loop of refresh requests, potentially bringing down the web and database server by flooding it with requests. The more browser sessions that are open, the more intense the attack becomes. &lt;br /&gt;
&lt;br /&gt;
The '''DOM-based Cross-Site Scripting''' problem exists within a page's client-side script itself. If the JavaScript accesses a URL request parameter (an example would be an RSS feed) and uses this information to write some HTML to its own page, and this information is not encoded using HTML entities, an XSS vulnerability will likely be present, since this written data will be re-interpreted by browsers as HTML which could include additional client-side script.&lt;br /&gt;
Exploiting such a hole would be very similar to the exploitation of Reflected XSS vulnerabilities, except in one very important situation. &lt;br /&gt;
&lt;br /&gt;
For example, if an attacker hosts a malicious website which contains a link to a vulnerable page on a client's local system, a script could be injected and would run with privileges of that user's browser on their system. This bypasses the entire client-side sandbox, not just the cross-domain restrictions that are normally bypassed with XSS exploits.&lt;br /&gt;
&lt;br /&gt;
The methods of injection can vary a great deal. A perfect example of how this type of an attack could impact an organization, instead of an individual, was demonstrated by Jeremiah Grossman @ BlackHat USA 2006. The demonstration gave an example of how posting a stored XSS script to a popular blog, newspaper, or page comments section of a website can cause all the visitors of that page to have their internal networks scanned and logged for a particular type of vulnerability.&lt;br /&gt;
&lt;br /&gt;
==Black Box testing and example==&lt;br /&gt;
&lt;br /&gt;
One way to test for XSS vulnerabilities is to verify whether an application or web server will respond to requests containing simple scripts with an HTTP response that could be executed by a browser. For example, Sambar Server (version 5.3) is a popular freeware web server with known XSS vulnerabilities. Sending the server a request such as the following generates a response from the server that will be executed by a web browser:&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://server/cgi-bin/testcgi.exe?&amp;lt;SCRIPT&amp;gt;alert(“Cookie”+document.cookie)&amp;lt;/SCRIPT&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The script is executed by the browser because the application generates an error message containing the original script, and the browser interprets the response as an executable script originating from the server.&lt;br /&gt;
All web servers and web applications are potentially vulnerable to this type of misuse, and preventing such attacks is extremely difficult.&lt;br /&gt;
&lt;br /&gt;
'''Example 1:'''&lt;br /&gt;
&lt;br /&gt;
Since JavaScript is case sensitive, some people attempt to filter XSS by converting all characters to upper case, rendering Cross Site Scripting utilizing inline JavaScript useless.  If this is the case, you may want to use VBScript since it is not a case sensitive language.&lt;br /&gt;
&lt;br /&gt;
JavaScript: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;script&amp;gt;alert(document.cookie);&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
VBScript: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;script type=&amp;quot;text/vbscript&amp;quot;&amp;gt;alert(DOCUMENT.COOKIE)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, you can use the SRC attribute to load the attacker's JavaScript from an external site (see Example 2 below), causing the JavaScript payload to be loaded directly and bypassing capitalization effects altogether.&lt;br /&gt;
&lt;br /&gt;
'''Example 2:'''&lt;br /&gt;
&lt;br /&gt;
If they are filtering for the &amp;lt; or the open of &amp;lt;script or closing of script&amp;gt; you should try various methods of encoding:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;script src=http://www.example.com/malicious-code.js&amp;gt;&amp;lt;/script&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%3cscript src=http://www.example.com/malicious-code.js%3e%3c/script%3e&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;\x3cscript src=http://www.example.com/malicious-code.js\x3e\x3c/script\x3e&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can find more examples of XSS Injection here: http://www.owasp.org/index.php/OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* RSnake: &amp;quot;XSS (Cross Site Scripting) Cheat Sheet&amp;quot; - http://ha.ckers.org/xss.html&lt;br /&gt;
&lt;br /&gt;
* Jeremiah Grossman: &amp;quot;Hacking Intranet Websites from the Outside &amp;quot;JavaScript malware just got a lot more dangerous&amp;quot;&amp;quot; - http://www.blackhat.com/presentations/bh-jp-06/BH-JP-06-Grossman.pdf&lt;br /&gt;
&lt;br /&gt;
* Amit Klien: &amp;quot;DOM Based Cross Site Scripting&amp;quot; - http://www.securiteam.com/securityreviews/5MP080KGKW.html&lt;br /&gt;
&lt;br /&gt;
* Paul Lindner: &amp;quot;Preventing Cross-site Scripting Attacks&amp;quot; - http://www.perl.com/pub/a/2002/02/20/css.html&lt;br /&gt;
&lt;br /&gt;
* CERT: &amp;quot;CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests&amp;quot; - http://www.cert.org/advisories/CA-2000-02.html&lt;br /&gt;
&lt;br /&gt;
* Aung Khant: &amp;quot;What XSS Can do - Benefits of XSS From Attacker's view&amp;quot; - http://yehg.net/lab/pr0js/papers/What%20XSS%20Can%20Do.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&lt;br /&gt;
CAL9000 includes a sortable implementation of RSnake's XSS Attacks, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. It's hosted at: http://sec101.sourceforge.net/CAL9000/&lt;br /&gt;
&lt;br /&gt;
* '''PHP Charset Encoder(PCE)''' - http://yehg.net/encoding&lt;br /&gt;
PCE helps you encode arbitrary texts to and from 65 kinds of charsets that you can use in your customized payloads.  &lt;br /&gt;
&lt;br /&gt;
* '''HackVector(HVR)''' - http://www.businessinfo.co.uk/labs/hackvertor/hackvertor.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Top_Ten_Project&amp;diff=194321</id>
		<title>OWASP Internet of Things Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Top_Ten_Project&amp;diff=194321"/>
				<updated>2015-05-01T19:58:15Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* Feedback */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things Top 10==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things (IoT) Top 10 is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project defines the top ten security surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Significant IoT Security Surface Areas&lt;br /&gt;
* A list of basic recommendations for manufacturers, developers, and consumers&lt;br /&gt;
&lt;br /&gt;
For each attack surface areas, the following sections are included:&lt;br /&gt;
&lt;br /&gt;
* A description of the attack surface&lt;br /&gt;
* Threat agents&lt;br /&gt;
* Attack vectors&lt;br /&gt;
* Security weaknesses&lt;br /&gt;
* Technical impacts&lt;br /&gt;
* Business impacts&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid the issue&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:&lt;br /&gt;
&lt;br /&gt;
* For each I''N'' category, list the top few considerations that should be observed in that context&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OZEpHalF3cDFlWWs/view?usp=sharing OWASP Internet of Things Top Ten 2014 PDF]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OYVoweHNBeVFDdGs/view?usp=sharing OWASP Internet of Things Top Ten 2014 Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing OWASP IoT Top Ten RSA 2015 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[[https://lists.owasp.org/mailman/listinfo/owasp_internet_of_things_top_ten_project Subcribe here]]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [April 2015] Added the IoT Top 10 talk from RSA&lt;br /&gt;
* [April 2015] Added an IoT Top 10 Infographic&lt;br /&gt;
* IoT day is April 9th!&lt;br /&gt;
* [February 2015] Added a PDF containing a walk through of the project and the Top Ten.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Internet of Things Top 10 for 2014 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Top 10 - 2014 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | I3 Insecure Network Services]]&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | I5 Privacy Concerns]]&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” &lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.&lt;br /&gt;
&lt;br /&gt;
Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Internet of Things Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Internet of Things Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to Daniel.Miessler@owasp.org, Craig.Smith@owasp.org, or Jason.Haddix@owasp.org, Thanks!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/ HP Fortify on Demand]&lt;br /&gt;
* Contribute and add your name here!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015&lt;br /&gt;
&lt;br /&gt;
= In the News =&lt;br /&gt;
 &lt;br /&gt;
* [http://www.forbes.com/sites/joemckendrick/2015/03/25/is-the-internet-of-things-heralding-the-next-great-economic-shift/ &amp;quot;Why the Internet of Things Heralds the Next Great Economic Disruption&amp;quot;] ''Forbes.'' Forbes 25 March 2015&lt;br /&gt;
* [http://www.fastcompany.com/3044046/tech-forecast/welcome-to-privacy-hell-otherwise-known-as-the-internet-of-things &amp;quot;Welcome to Privacy Hell, Also Known As the Internet of Things&amp;quot;] ''FastCompany.'' FastCompany 23 March 2015&lt;br /&gt;
* [http://www.nextgov.com/emerging-tech/2015/03/senate-passes-resolution-national-strategy-internet-things/108358/ &amp;quot;Senate Passes Resolution for National Strategy on Internet of Things&amp;quot;] ''Nextgov.'' Nextgov 25 March 2015&lt;br /&gt;
* [http://www.techhive.com/article/2901042/ftc-wants-to-keep-closer-watch-on-the-internet-of-things.html &amp;quot;FTC wants to keep closer watch on the Internet of Things&amp;quot;] ''TechHive.'' TechHive 24 March 2015&lt;br /&gt;
* [http://www.esecurityplanet.com/network-security/6-tips-for-developing-secure-iot-apps.html &amp;quot;6 Tips for Developing Secure IoT Apps&amp;quot;] ''eSecurity Planet.'' eSecurity Planet 26 February 2015&lt;br /&gt;
* [http://www.cmswire.com/cms/internet-of-things/6-reasons-hackers-love-the-internet-of-things-028074.php &amp;quot;6 Reasons Hackers Love the Internet of Things&amp;quot;] ''CMS Wire.'' CMS Wire 13 February 2015&lt;br /&gt;
* [http://www.zdnet.com/article/frankenbeast-thats-hps-considered-view-of-the-lack-of-security-of-the-internet-of-things &amp;quot;Fighting the Frankenbeast: How to stop security fears slowing the Internet of Things&amp;quot;] ''ZDNET.'' ZDNET 12 February 2015&lt;br /&gt;
* [http://mobileenterprise.edgl.com/news/IoT-Security-is-Not-One-Dimensional97740 &amp;quot;IoT Security is Not One-Dimensional&amp;quot;] ''Mobile Enterprise.'' Mobile Enterprise 27 January 2015&lt;br /&gt;
* [http://www.choice.com.au/media-and-news/consumer-news/news/smart-home-security-threats-151214.aspx &amp;quot;Smart Santa a security nightmare&amp;quot;] ''Choice.'' Choice 15 December 2014&lt;br /&gt;
* [http://www.zdnet.com/article/internet-of-things-rich-with-folly-ripe-with-concerns &amp;quot;Internet of Things rich with folly, ripe with concerns&amp;quot;] ''ZDNET.'' ZDNET 12 November 2014&lt;br /&gt;
* [https://devcentral.f5.com/articles/internet-of-things-owasp-top-10 &amp;quot;Internet of Things OWASP Top 10&amp;quot;] ''F5 DevCentral.'' F5 DevCentral, 30 July 2014&lt;br /&gt;
* [http://resources.infosecinstitute.com/test-security-iot-smart-devices/ &amp;quot;Testing the Security of Smart Devices with the OWASP Top Ten&amp;quot;] ''Infosec Institute.'' Infosec Institute 10 November 2014&lt;br /&gt;
* [https://www.virtual.com/blog/detail/internet-of-things-iot-security-resource-owasp-top-10/269 &amp;quot;Internet of Things (IoT) Security Resource: OWASP Top 10&amp;quot;] ''Advanced Systems Group.'' Advanced Systems Group 28 August 2014&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Conferences - April 2015=&lt;br /&gt;
&lt;br /&gt;
* [https://open.sap.com/courses/iot1 How the Internet of Things and Smart Services will Change Society] Walldorf, Germany March 25 - May 05&lt;br /&gt;
* [http://issnip2015.org/#/ IEEE ISSNIP 2015] Singapore April 7 - April 10&lt;br /&gt;
* [http://www.issnip.org/riot2015/ 2015 International Conference on Recent Advances in Internet of Things (RIoT)] Singapore April 7&lt;br /&gt;
* [http://www.sido-event.com/en/event-connected-objects-lyon-france.html SIdO - The Connected Business] Lyon, France April 7 - April 8&lt;br /&gt;
* [http://www.internetofthingsasia.com/events/iot-asia-2015/event-summary-2fae431387124a1d9981c93c3f9e87dc.aspx IoT Asia] April 8 - April 9&lt;br /&gt;
* [http://iotday.org/events/map/ IoT Day Events] April 9&lt;br /&gt;
* [http://www.iot-vienna.at/global-iot-day-event/2015/doku.php Global IoT Day Event Vienna 2015] Wien, Austria April 9&lt;br /&gt;
* [http://nordiciothackathon.com Nordic IoT Hackathon 2015] Lund, Sweden April 10 - April 12&lt;br /&gt;
* [http://ontolog-02.cim3.net/wiki/OntologySummit2015 Ontology Summit 2015 : Internet of Things: Toward Smart Networked Systems and Societies] Arlington, US April 13&lt;br /&gt;
* [http://www.arena-international.com/iot/ Monetising the Internet of Things 2015] Frankfurt am Main, Germany April 15 - April 16&lt;br /&gt;
* [http://www.truste.com/events/iot/ IoT Privacy Summit 2015] Mountain View, US April 18&lt;br /&gt;
* [http://iot.streamconf.com IoT Stream Conference] San Francisco, US April 23&lt;br /&gt;
* [http://theinnovationenterprise.com/summits/internet-of-things-summit-san-jose-2015 2015 Internet of Things Summit] San Jose, US April 28 - April 29&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[https://ifttt.com/ If This Then That (IFTTT)]&lt;br /&gt;
&lt;br /&gt;
A service that lets you create powerful connections with one simple statement.&lt;br /&gt;
&lt;br /&gt;
Channels are the basic building blocks of IFTTT. Channels include:&lt;br /&gt;
* Triggers - The ''this'' part of a Recipe&lt;br /&gt;
* Actions - The ''that'' part of a Recipe&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
= Manufacturers =&lt;br /&gt;
&lt;br /&gt;
== Manufacturer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT) &lt;br /&gt;
&lt;br /&gt;
The goal of this page is help manufacturers build more secure products in the Internet of Things space. The guidance below is at a basic level, giving builders of products a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface in the product disallows weak passwords&lt;br /&gt;
* Ensure that any web interface in the product has an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface in the product has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Include web application firewalls to protect any web interfaces&lt;br /&gt;
* Ensure that any web interface allows the owner to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any access requiring authentication requires strong passwords&lt;br /&gt;
* Ensure that user roles can be properly segregated in multi-user environments&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are secure&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all devices operate with a minimal number of network ports active&lt;br /&gt;
* Ensure all devices do not make network ports and/or services available to the internet via UPnP for example&lt;br /&gt;
* Review all required network services for vulnerabilities such as buffer overflows or denial of service&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all communication between system components is encrypted as well as encrypting traffic between the system or device and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Ensure SSL/TLS implementations are up to date and properly configured&lt;br /&gt;
* Consider making a firewall option available for the product&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensure only authorized individuals have access to collected personal information&lt;br /&gt;
* Ensure only less sensitive data is collected&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring a data retention policy is in place&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that any cloud-based web interface has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure password security options are made available (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure encryption options are made available (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure secure logging is available for security events&lt;br /&gt;
* Ensure alerts and notifications are available to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all system devices have update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure update files are encrypted and that the files are also transmitted using encryption&lt;br /&gt;
* Ensure that update files are signed and then validated by the device before installing&lt;br /&gt;
* Ensure update servers are secure&lt;br /&gt;
* Ensure the product has the ability to implement scheduled updates&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure the device is produced with a minimal number of physical external ports (e.g. USB ports)&lt;br /&gt;
* Ensure the firmware of Operating System can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure the product is tamper resistant&lt;br /&gt;
* Ensure the product has the ability to limit administrative capabilities in some fashion, possibly by only connecting locally for admin functions&lt;br /&gt;
* Ensure the product has the ability to disable external ports such as USB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendation for all Internet of Things products:&lt;br /&gt;
* Avoid the potential for persistent vulnerabilities in devices that have no update capability by ensuring that all devices and systems are built with the ability to be updated when vulnerabilities are discovered&lt;br /&gt;
* Rebranded devices used as part of a system should be properly configured so that unnecessary or unintended services do not remain active after the rebranding&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&lt;br /&gt;
== Developer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help developers build more secure applications in the Internet of Things space. The guidance below is at a basic level, giving developers of applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface coding is written to prevent the use of weak passwords&lt;br /&gt;
* Ensure that any web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Ensure that any web interface coding is written to allow the owner to change the username and password&lt;br /&gt;
* Consider the use of web application firewalls to protect any web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that applications are written to require strong passwords where authentication is needed&lt;br /&gt;
* Ensure the application takes into account multi-user environments and includes functionality for role separation&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are written to function in a secure manner&lt;br /&gt;
* Ensure that applications are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that applications are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that applications are written to include the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications that use network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Ensure applications test ports are taken out of service before going to production&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to make use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Consider making a firewall option available for the application&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that any cloud interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that any cloud interface coding is written to allow the owner to change the username and password&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to change the default username and password&lt;br /&gt;
* Ensure that mobile interfaces only collect the minimum amount of personal information needed&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to include password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure applications are written to include encryption options (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure all applications are written to produce logs for security events&lt;br /&gt;
* Ensure all applications are written to produce alerts and notifications to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to include update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure all applications are written to process encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Ensure all applications are written to process signed files and then validate that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to utilize a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Ensure all applications can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure all applications are written to allow for disabling of unused physical ports such as USB&lt;br /&gt;
* Consider writing applications to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
= Consumers =&lt;br /&gt;
&lt;br /&gt;
== Consumer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help consumers purchase secure products in the Internet of Things space. The guidance below is at a basic level, giving consumers a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly aid the consumer in purchasing a secure IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has the option to set user privileges, consider setting user privileges to the minimal needed for operation&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a firewall option available, enable it and ensure that it can only be accessed from your client systems&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Do not enter sensitive information into the system that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
* Deny data collection if it appears to be beyond what is needed for proper operation of the device (If provided the choice)&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If the mobile application has the option to require a PIN or password, consider using it for extra security (on client and server)&lt;br /&gt;
* If the mobile application has the option to use two factory authentication such as Apple's Touch ID, ensure it is enabled&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* Do not enter sensitive information into the mobile application that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option, enable any logging functionality for security-related events&lt;br /&gt;
* If your system has the option, enable any alert and notification functionality for security-related events&lt;br /&gt;
* If your system has security options for passwords, ensure they are enabled for strong passwords&lt;br /&gt;
* If your system has security options for encryption, ensure they are set for an accepted standard such as AES-256&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to verify updates, ensure it is enabled&lt;br /&gt;
* If your system has the option to download updates securely, ensure it is enabled&lt;br /&gt;
* If your system has the ability to schedule updates on a regular cadence, consider enabling it&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the ability to limit administrative capabilities possible by connecting locally, consider enabling that feature&lt;br /&gt;
* Disable any unused physical ports through the administrative interface&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
If you are looking to purchase a device or system, consider the following recommendations:&lt;br /&gt;
* Include security in feature considerations when evaluating a product&lt;br /&gt;
* Place Internet of Things devices on a separate network if possible using a firewall&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Internet_of_Things_Top_Ten_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=190749</id>
		<title>Projects/OWASP Mobile Security Project -2015 Scratchpad</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=190749"/>
				<updated>2015-03-03T17:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* Comments on Submitted Data */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is just a place to gather some ideas for the 2015 reworking of the Mobile Top Ten. It's totally unofficial open musings about truth, beauty, and justice.&lt;br /&gt;
&lt;br /&gt;
=What is It?=&lt;br /&gt;
&lt;br /&gt;
This is the &amp;quot;Mobile Top Ten&amp;quot; ''what''? It's the top 10 &amp;quot;stuff people tend to screw up&amp;quot;, but here are some important questions.&lt;br /&gt;
&lt;br /&gt;
* Business risk or technical risk? The business risk would be something like &amp;quot;intellectual property unprotected&amp;quot; or &amp;quot;customer data exposed.&amp;quot; A technical risk would be something like &amp;quot;data stored in plain text files.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Root cause, or final impact? Often root causes are things like not encrypting when we should. Final impact is stuff like unintended data leaks. The problem is that some of these things are overlapping. Not every lack of crypto is a data leak, but many are.&lt;br /&gt;
&lt;br /&gt;
* What threats are in scope? There are apps that simply do not care about protecting from malware, jailbreaking, etc. Think Yelp: it's just restaurant reviews. No financial impact, no reason to care about many client-side attacks. Plenty of apps ''do'' care about client-side attacks. E.g., banking, communications, health data. Many items hinge on whether or not you care about client side attacks. How do we capture this?&lt;br /&gt;
** If you care about client-side attacks, then failing to encrypt stuff is basically a data leakage.&lt;br /&gt;
** If you don't care about client-side attacks, then failing to encrypt stuff is kinda &amp;quot;gee you should do that&amp;quot;.&lt;br /&gt;
** If you care about client-side attacks, there are probably some platform features that are not sufficient as-is: the app sandbox, etc. You probably want to be putting your own additional layer of encryptiong / protection, etc.&lt;br /&gt;
** If you don't care about client-side attacks, then you simply need to be using the standard APIs (keychain, app data storage, etc.) in the standard supported ways.&lt;br /&gt;
&lt;br /&gt;
=Who is it For?=&lt;br /&gt;
&lt;br /&gt;
Do we intend this to be a tool that infosec / appsec people use? Do we intend lay people to make use of it? (e.g., developers and non-mobile IT security people) What does the target audience need to get from it?&lt;br /&gt;
&lt;br /&gt;
(''Paco's opinion'') We need to have a narrative: If you found functionality that does X, it is probably in bucket A, unless it is also doing (or not doing) Y, in which case that's bucket B.&lt;br /&gt;
&lt;br /&gt;
=Comments on Submitted Data=&lt;br /&gt;
&lt;br /&gt;
==General==&lt;br /&gt;
&lt;br /&gt;
(Jason) By looking at some data sets it becomes clear there is a doctrine that some consultancies use to do mobile testing. Some did not contribute m1 data, because they consider mobile security client-only. The same applied to m10. In addition, a couple of datasets used CWE IDs. These were harder to parse because generic CWE's do not specify if the vuln is client or server (and in a lot of these cases the vuln could be either). As Paco stated, code quality, source level findings are hard to categorize as well.&lt;br /&gt;
&lt;br /&gt;
==BugCrowd==&lt;br /&gt;
I see “storing passwords in the clear” as a very common finding among their data. It gets classifed as M5 poor authentication, M2 insecure data storage, M4 data leakage, and sometimes M6 (broken crypto).&lt;br /&gt;
&lt;br /&gt;
I see “storing session tokens insecurely” as a common finding. It is getting classified as M9 (session handling) and M2 (insecure data storage). I wonder openly whether passwords and session tokens are really that different.&lt;br /&gt;
&lt;br /&gt;
We see a lot of caching of non-password, non-session data. Some of it is done explicitly by the app, some of it is done by the mobile OS through snapshotting, backups, etc. Sometimes it is classified as “data leakage” (M4) and sometimes as insecure storage (M2). And what is interesting is that some of it is the result of the OS and some is the result of the app. Do we want to make that distinction in the T10?&lt;br /&gt;
&lt;br /&gt;
==MetaIntelli==&lt;br /&gt;
&lt;br /&gt;
They only have 18 distinct things they report on, though they have 111,000 data points. Two of the 18 things are double-counted. They appear to be categorised in both M3 and another one.&lt;br /&gt;
&lt;br /&gt;
=Other Questions=&lt;br /&gt;
Communications issues are a problem a lot. But TLS and crypto are tightly coupled. “Communications issues&amp;quot; includes certificate pinning, weak TLS ciphers, improper cert validation, HTTP and plaintext protocols, and more. There’s a lot of overlap with “broken crypto” like using Base64 instead of encryption, hard coded keys/passwords, weak hash algorithms, and so on. How do we tease out “crypto” issues from “communications” issues from “insecure storage” issues?&lt;br /&gt;
&lt;br /&gt;
I can imagine a heuristic like this:&lt;br /&gt;
* did you use crypto where you were supposed to, but the crypto primitive you chose wasn’t appropriate for the task? That’s broken crypto.&lt;br /&gt;
* Did you omit crypto entirely when you should have used it? That’s insecure comms or insecure storage.&lt;br /&gt;
&lt;br /&gt;
Some findings are deeply mobile (e.g., intent hijacking, keychain issues, jailbreak/root detection, etc.). They’re really tied to their respective platforms. Is that a problem for us? Does it matter?&lt;br /&gt;
&lt;br /&gt;
=Conclusions Drawn From Data=&lt;br /&gt;
These are conclusions proposed from the 2014 data.&lt;br /&gt;
==At Least One New Category Is Needed==&lt;br /&gt;
((Paco)) The &amp;quot;Other&amp;quot; category is not the least popular category. It's more popular, by an order of magnitude, than several others. This tells me that if we had a better category that captured &amp;quot;other&amp;quot; findings, it would be a benefit to the users of the top 10.&lt;br /&gt;
&lt;br /&gt;
==The Bottom 5 Categories account for 25% Or Less==&lt;br /&gt;
&lt;br /&gt;
The least popular 5 items are (where &amp;quot;1&amp;quot; is the least popular and &amp;quot;5&amp;quot; is 5th least popular or 6th most popular):&lt;br /&gt;
&lt;br /&gt;
# M8: Security Decisions Via Untrusted Inputs&lt;br /&gt;
# M7: Client Side Injection&lt;br /&gt;
# M9: Improper Session Handling&lt;br /&gt;
# M6: Broken Cryptography&lt;br /&gt;
# M1: Weak Server Side Controls&lt;br /&gt;
&lt;br /&gt;
Combined with the fact that the 3rd or 4th most popular category is &amp;quot;Other&amp;quot;, this suggests that 2 or 3 of these are, in fact, not in the &amp;quot;top ten&amp;quot;. They may be, for example, 11 and 12 or even higher.&lt;br /&gt;
&lt;br /&gt;
==The Existing Buckets are Hard To Use==&lt;br /&gt;
&lt;br /&gt;
A few contributors tried to categorise their findings into the existing MT10. When they did, they showed symptoms of difficulty. Some examples in the table below show how MetaIntelli flagged findings in two different categories, and BugCrowd flagged the same kind of finding in 3 different categories. This suggests that the existing MT10 is not clear enough about where these issues belong.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! Description&lt;br /&gt;
! Contributor&lt;br /&gt;
! Categories&lt;br /&gt;
|-&lt;br /&gt;
|The app is not verifying hostname, certificate matching and validity when doing SSL secure connections.&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M9&lt;br /&gt;
|-&lt;br /&gt;
|Contains URLs with not valid SSL certificates and/or chain of trust&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M5&lt;br /&gt;
|-&lt;br /&gt;
|Authentication cookies stored in cleartext in sqlite database&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M9 - Improper Session Handling&lt;br /&gt;
|-&lt;br /&gt;
|Blackberry app stores credentials in plaintext&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M2 - Insecure Data Storage&lt;br /&gt;
|-&lt;br /&gt;
|Credentials and sensitive information not secured on Windows Phone app&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M5 - Poor Authorization and Authentication&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Some Topics that Show Up But Are Hard To Place==&lt;br /&gt;
&lt;br /&gt;
There are a few things that show up in the contributed data that do not have a good category to go into.&lt;br /&gt;
&lt;br /&gt;
===Code Level Findings===&lt;br /&gt;
&lt;br /&gt;
If someone is doing bad C coding (e.g., strcpy() and similar), there is no good bucket for that. Likewise, misusing the platform APIs (e.g., Android, iOS, etc.) is not well covered. It's hard to place violations of platform best practices (e.g., with intents and broadcasts and so on).&lt;br /&gt;
&lt;br /&gt;
=Top Ten Scratchpad=&lt;br /&gt;
Here's some top-ten possible categories. This is a wiki. Edit them. Change them. Leave comments. Mark it up.&lt;br /&gt;
&lt;br /&gt;
==M1: Weak Server Side Controls                 ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M2: Insecure Data Storage                     ==&lt;br /&gt;
(Jason) As i look through the data I think more and more about how m2 and m4 might be combined.&lt;br /&gt;
&lt;br /&gt;
==M3: Insufficient Transport Layer Protection   ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M4: Unintended Data Leakage                   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M5: Poor Authorization and Authentication     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M6: Broken Cryptography                       ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M7: Client Side Injection                     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M8: Security Decisions Via Untrusted Inputs   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M9: Improper Session Handling                 ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M10: Lack of Binary Protections               ==&lt;br /&gt;
&lt;br /&gt;
(Jason) Regarding m10 - Several submissions reported m10 vulns. Unfortunately some were types of services such as binary reputation scanners, that do not have the ability to check for dynamic or code level findings. In order to fix this i recommend a name change or re-working of this category.  I want to separate out the delineation of Anti-exploit vs Code Obfuscation/Anti-reversing. Must talk to group about this.&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=190748</id>
		<title>Projects/OWASP Mobile Security Project -2015 Scratchpad</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=190748"/>
				<updated>2015-03-03T17:03:48Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* M2: Insecure Data Storage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is just a place to gather some ideas for the 2015 reworking of the Mobile Top Ten. It's totally unofficial open musings about truth, beauty, and justice.&lt;br /&gt;
&lt;br /&gt;
=What is It?=&lt;br /&gt;
&lt;br /&gt;
This is the &amp;quot;Mobile Top Ten&amp;quot; ''what''? It's the top 10 &amp;quot;stuff people tend to screw up&amp;quot;, but here are some important questions.&lt;br /&gt;
&lt;br /&gt;
* Business risk or technical risk? The business risk would be something like &amp;quot;intellectual property unprotected&amp;quot; or &amp;quot;customer data exposed.&amp;quot; A technical risk would be something like &amp;quot;data stored in plain text files.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Root cause, or final impact? Often root causes are things like not encrypting when we should. Final impact is stuff like unintended data leaks. The problem is that some of these things are overlapping. Not every lack of crypto is a data leak, but many are.&lt;br /&gt;
&lt;br /&gt;
* What threats are in scope? There are apps that simply do not care about protecting from malware, jailbreaking, etc. Think Yelp: it's just restaurant reviews. No financial impact, no reason to care about many client-side attacks. Plenty of apps ''do'' care about client-side attacks. E.g., banking, communications, health data. Many items hinge on whether or not you care about client side attacks. How do we capture this?&lt;br /&gt;
** If you care about client-side attacks, then failing to encrypt stuff is basically a data leakage.&lt;br /&gt;
** If you don't care about client-side attacks, then failing to encrypt stuff is kinda &amp;quot;gee you should do that&amp;quot;.&lt;br /&gt;
** If you care about client-side attacks, there are probably some platform features that are not sufficient as-is: the app sandbox, etc. You probably want to be putting your own additional layer of encryptiong / protection, etc.&lt;br /&gt;
** If you don't care about client-side attacks, then you simply need to be using the standard APIs (keychain, app data storage, etc.) in the standard supported ways.&lt;br /&gt;
&lt;br /&gt;
=Who is it For?=&lt;br /&gt;
&lt;br /&gt;
Do we intend this to be a tool that infosec / appsec people use? Do we intend lay people to make use of it? (e.g., developers and non-mobile IT security people) What does the target audience need to get from it?&lt;br /&gt;
&lt;br /&gt;
(''Paco's opinion'') We need to have a narrative: If you found functionality that does X, it is probably in bucket A, unless it is also doing (or not doing) Y, in which case that's bucket B.&lt;br /&gt;
&lt;br /&gt;
=Comments on Submitted Data=&lt;br /&gt;
&lt;br /&gt;
==BugCrowd==&lt;br /&gt;
I see “storing passwords in the clear” as a very common finding among their data. It gets classifed as M5 poor authentication, M2 insecure data storage, M4 data leakage, and sometimes M6 (broken crypto).&lt;br /&gt;
&lt;br /&gt;
I see “storing session tokens insecurely” as a common finding. It is getting classified as M9 (session handling) and M2 (insecure data storage). I wonder openly whether passwords and session tokens are really that different.&lt;br /&gt;
&lt;br /&gt;
We see a lot of caching of non-password, non-session data. Some of it is done explicitly by the app, some of it is done by the mobile OS through snapshotting, backups, etc. Sometimes it is classified as “data leakage” (M4) and sometimes as insecure storage (M2). And what is interesting is that some of it is the result of the OS and some is the result of the app. Do we want to make that distinction in the T10?&lt;br /&gt;
&lt;br /&gt;
==MetaIntelli==&lt;br /&gt;
&lt;br /&gt;
They only have 18 distinct things they report on, though they have 111,000 data points. Two of the 18 things are double-counted. They appear to be categorised in both M3 and another one.&lt;br /&gt;
&lt;br /&gt;
=Other Questions=&lt;br /&gt;
Communications issues are a problem a lot. But TLS and crypto are tightly coupled. “Communications issues&amp;quot; includes certificate pinning, weak TLS ciphers, improper cert validation, HTTP and plaintext protocols, and more. There’s a lot of overlap with “broken crypto” like using Base64 instead of encryption, hard coded keys/passwords, weak hash algorithms, and so on. How do we tease out “crypto” issues from “communications” issues from “insecure storage” issues?&lt;br /&gt;
&lt;br /&gt;
I can imagine a heuristic like this:&lt;br /&gt;
* did you use crypto where you were supposed to, but the crypto primitive you chose wasn’t appropriate for the task? That’s broken crypto.&lt;br /&gt;
* Did you omit crypto entirely when you should have used it? That’s insecure comms or insecure storage.&lt;br /&gt;
&lt;br /&gt;
Some findings are deeply mobile (e.g., intent hijacking, keychain issues, jailbreak/root detection, etc.). They’re really tied to their respective platforms. Is that a problem for us? Does it matter?&lt;br /&gt;
&lt;br /&gt;
=Conclusions Drawn From Data=&lt;br /&gt;
These are conclusions proposed from the 2014 data.&lt;br /&gt;
==At Least One New Category Is Needed==&lt;br /&gt;
((Paco)) The &amp;quot;Other&amp;quot; category is not the least popular category. It's more popular, by an order of magnitude, than several others. This tells me that if we had a better category that captured &amp;quot;other&amp;quot; findings, it would be a benefit to the users of the top 10.&lt;br /&gt;
&lt;br /&gt;
==The Bottom 5 Categories account for 25% Or Less==&lt;br /&gt;
&lt;br /&gt;
The least popular 5 items are (where &amp;quot;1&amp;quot; is the least popular and &amp;quot;5&amp;quot; is 5th least popular or 6th most popular):&lt;br /&gt;
&lt;br /&gt;
# M8: Security Decisions Via Untrusted Inputs&lt;br /&gt;
# M7: Client Side Injection&lt;br /&gt;
# M9: Improper Session Handling&lt;br /&gt;
# M6: Broken Cryptography&lt;br /&gt;
# M1: Weak Server Side Controls&lt;br /&gt;
&lt;br /&gt;
Combined with the fact that the 3rd or 4th most popular category is &amp;quot;Other&amp;quot;, this suggests that 2 or 3 of these are, in fact, not in the &amp;quot;top ten&amp;quot;. They may be, for example, 11 and 12 or even higher.&lt;br /&gt;
&lt;br /&gt;
==The Existing Buckets are Hard To Use==&lt;br /&gt;
&lt;br /&gt;
A few contributors tried to categorise their findings into the existing MT10. When they did, they showed symptoms of difficulty. Some examples in the table below show how MetaIntelli flagged findings in two different categories, and BugCrowd flagged the same kind of finding in 3 different categories. This suggests that the existing MT10 is not clear enough about where these issues belong.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! Description&lt;br /&gt;
! Contributor&lt;br /&gt;
! Categories&lt;br /&gt;
|-&lt;br /&gt;
|The app is not verifying hostname, certificate matching and validity when doing SSL secure connections.&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M9&lt;br /&gt;
|-&lt;br /&gt;
|Contains URLs with not valid SSL certificates and/or chain of trust&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M5&lt;br /&gt;
|-&lt;br /&gt;
|Authentication cookies stored in cleartext in sqlite database&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M9 - Improper Session Handling&lt;br /&gt;
|-&lt;br /&gt;
|Blackberry app stores credentials in plaintext&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M2 - Insecure Data Storage&lt;br /&gt;
|-&lt;br /&gt;
|Credentials and sensitive information not secured on Windows Phone app&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M5 - Poor Authorization and Authentication&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Some Topics that Show Up But Are Hard To Place==&lt;br /&gt;
&lt;br /&gt;
There are a few things that show up in the contributed data that do not have a good category to go into.&lt;br /&gt;
&lt;br /&gt;
===Code Level Findings===&lt;br /&gt;
&lt;br /&gt;
If someone is doing bad C coding (e.g., strcpy() and similar), there is no good bucket for that. Likewise, misusing the platform APIs (e.g., Android, iOS, etc.) is not well covered. It's hard to place violations of platform best practices (e.g., with intents and broadcasts and so on).&lt;br /&gt;
&lt;br /&gt;
=Top Ten Scratchpad=&lt;br /&gt;
Here's some top-ten possible categories. This is a wiki. Edit them. Change them. Leave comments. Mark it up.&lt;br /&gt;
&lt;br /&gt;
==M1: Weak Server Side Controls                 ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M2: Insecure Data Storage                     ==&lt;br /&gt;
(Jason) As i look through the data I think more and more about how m2 and m4 might be combined.&lt;br /&gt;
&lt;br /&gt;
==M3: Insufficient Transport Layer Protection   ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M4: Unintended Data Leakage                   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M5: Poor Authorization and Authentication     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M6: Broken Cryptography                       ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M7: Client Side Injection                     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M8: Security Decisions Via Untrusted Inputs   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M9: Improper Session Handling                 ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M10: Lack of Binary Protections               ==&lt;br /&gt;
&lt;br /&gt;
(Jason) Regarding m10 - Several submissions reported m10 vulns. Unfortunately some were types of services such as binary reputation scanners, that do not have the ability to check for dynamic or code level findings. In order to fix this i recommend a name change or re-working of this category.  I want to separate out the delineation of Anti-exploit vs Code Obfuscation/Anti-reversing. Must talk to group about this.&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=190747</id>
		<title>Projects/OWASP Mobile Security Project -2015 Scratchpad</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=190747"/>
				<updated>2015-03-03T16:57:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* M10: Lack of Binary Protections */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is just a place to gather some ideas for the 2015 reworking of the Mobile Top Ten. It's totally unofficial open musings about truth, beauty, and justice.&lt;br /&gt;
&lt;br /&gt;
=What is It?=&lt;br /&gt;
&lt;br /&gt;
This is the &amp;quot;Mobile Top Ten&amp;quot; ''what''? It's the top 10 &amp;quot;stuff people tend to screw up&amp;quot;, but here are some important questions.&lt;br /&gt;
&lt;br /&gt;
* Business risk or technical risk? The business risk would be something like &amp;quot;intellectual property unprotected&amp;quot; or &amp;quot;customer data exposed.&amp;quot; A technical risk would be something like &amp;quot;data stored in plain text files.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Root cause, or final impact? Often root causes are things like not encrypting when we should. Final impact is stuff like unintended data leaks. The problem is that some of these things are overlapping. Not every lack of crypto is a data leak, but many are.&lt;br /&gt;
&lt;br /&gt;
* What threats are in scope? There are apps that simply do not care about protecting from malware, jailbreaking, etc. Think Yelp: it's just restaurant reviews. No financial impact, no reason to care about many client-side attacks. Plenty of apps ''do'' care about client-side attacks. E.g., banking, communications, health data. Many items hinge on whether or not you care about client side attacks. How do we capture this?&lt;br /&gt;
** If you care about client-side attacks, then failing to encrypt stuff is basically a data leakage.&lt;br /&gt;
** If you don't care about client-side attacks, then failing to encrypt stuff is kinda &amp;quot;gee you should do that&amp;quot;.&lt;br /&gt;
** If you care about client-side attacks, there are probably some platform features that are not sufficient as-is: the app sandbox, etc. You probably want to be putting your own additional layer of encryptiong / protection, etc.&lt;br /&gt;
** If you don't care about client-side attacks, then you simply need to be using the standard APIs (keychain, app data storage, etc.) in the standard supported ways.&lt;br /&gt;
&lt;br /&gt;
=Who is it For?=&lt;br /&gt;
&lt;br /&gt;
Do we intend this to be a tool that infosec / appsec people use? Do we intend lay people to make use of it? (e.g., developers and non-mobile IT security people) What does the target audience need to get from it?&lt;br /&gt;
&lt;br /&gt;
(''Paco's opinion'') We need to have a narrative: If you found functionality that does X, it is probably in bucket A, unless it is also doing (or not doing) Y, in which case that's bucket B.&lt;br /&gt;
&lt;br /&gt;
=Comments on Submitted Data=&lt;br /&gt;
&lt;br /&gt;
==BugCrowd==&lt;br /&gt;
I see “storing passwords in the clear” as a very common finding among their data. It gets classifed as M5 poor authentication, M2 insecure data storage, M4 data leakage, and sometimes M6 (broken crypto).&lt;br /&gt;
&lt;br /&gt;
I see “storing session tokens insecurely” as a common finding. It is getting classified as M9 (session handling) and M2 (insecure data storage). I wonder openly whether passwords and session tokens are really that different.&lt;br /&gt;
&lt;br /&gt;
We see a lot of caching of non-password, non-session data. Some of it is done explicitly by the app, some of it is done by the mobile OS through snapshotting, backups, etc. Sometimes it is classified as “data leakage” (M4) and sometimes as insecure storage (M2). And what is interesting is that some of it is the result of the OS and some is the result of the app. Do we want to make that distinction in the T10?&lt;br /&gt;
&lt;br /&gt;
==MetaIntelli==&lt;br /&gt;
&lt;br /&gt;
They only have 18 distinct things they report on, though they have 111,000 data points. Two of the 18 things are double-counted. They appear to be categorised in both M3 and another one.&lt;br /&gt;
&lt;br /&gt;
=Other Questions=&lt;br /&gt;
Communications issues are a problem a lot. But TLS and crypto are tightly coupled. “Communications issues&amp;quot; includes certificate pinning, weak TLS ciphers, improper cert validation, HTTP and plaintext protocols, and more. There’s a lot of overlap with “broken crypto” like using Base64 instead of encryption, hard coded keys/passwords, weak hash algorithms, and so on. How do we tease out “crypto” issues from “communications” issues from “insecure storage” issues?&lt;br /&gt;
&lt;br /&gt;
I can imagine a heuristic like this:&lt;br /&gt;
* did you use crypto where you were supposed to, but the crypto primitive you chose wasn’t appropriate for the task? That’s broken crypto.&lt;br /&gt;
* Did you omit crypto entirely when you should have used it? That’s insecure comms or insecure storage.&lt;br /&gt;
&lt;br /&gt;
Some findings are deeply mobile (e.g., intent hijacking, keychain issues, jailbreak/root detection, etc.). They’re really tied to their respective platforms. Is that a problem for us? Does it matter?&lt;br /&gt;
&lt;br /&gt;
=Conclusions Drawn From Data=&lt;br /&gt;
These are conclusions proposed from the 2014 data.&lt;br /&gt;
==At Least One New Category Is Needed==&lt;br /&gt;
((Paco)) The &amp;quot;Other&amp;quot; category is not the least popular category. It's more popular, by an order of magnitude, than several others. This tells me that if we had a better category that captured &amp;quot;other&amp;quot; findings, it would be a benefit to the users of the top 10.&lt;br /&gt;
&lt;br /&gt;
==The Bottom 5 Categories account for 25% Or Less==&lt;br /&gt;
&lt;br /&gt;
The least popular 5 items are (where &amp;quot;1&amp;quot; is the least popular and &amp;quot;5&amp;quot; is 5th least popular or 6th most popular):&lt;br /&gt;
&lt;br /&gt;
# M8: Security Decisions Via Untrusted Inputs&lt;br /&gt;
# M7: Client Side Injection&lt;br /&gt;
# M9: Improper Session Handling&lt;br /&gt;
# M6: Broken Cryptography&lt;br /&gt;
# M1: Weak Server Side Controls&lt;br /&gt;
&lt;br /&gt;
Combined with the fact that the 3rd or 4th most popular category is &amp;quot;Other&amp;quot;, this suggests that 2 or 3 of these are, in fact, not in the &amp;quot;top ten&amp;quot;. They may be, for example, 11 and 12 or even higher.&lt;br /&gt;
&lt;br /&gt;
==The Existing Buckets are Hard To Use==&lt;br /&gt;
&lt;br /&gt;
A few contributors tried to categorise their findings into the existing MT10. When they did, they showed symptoms of difficulty. Some examples in the table below show how MetaIntelli flagged findings in two different categories, and BugCrowd flagged the same kind of finding in 3 different categories. This suggests that the existing MT10 is not clear enough about where these issues belong.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! Description&lt;br /&gt;
! Contributor&lt;br /&gt;
! Categories&lt;br /&gt;
|-&lt;br /&gt;
|The app is not verifying hostname, certificate matching and validity when doing SSL secure connections.&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M9&lt;br /&gt;
|-&lt;br /&gt;
|Contains URLs with not valid SSL certificates and/or chain of trust&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M5&lt;br /&gt;
|-&lt;br /&gt;
|Authentication cookies stored in cleartext in sqlite database&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M9 - Improper Session Handling&lt;br /&gt;
|-&lt;br /&gt;
|Blackberry app stores credentials in plaintext&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M2 - Insecure Data Storage&lt;br /&gt;
|-&lt;br /&gt;
|Credentials and sensitive information not secured on Windows Phone app&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M5 - Poor Authorization and Authentication&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Some Topics that Show Up But Are Hard To Place==&lt;br /&gt;
&lt;br /&gt;
There are a few things that show up in the contributed data that do not have a good category to go into.&lt;br /&gt;
&lt;br /&gt;
===Code Level Findings===&lt;br /&gt;
&lt;br /&gt;
If someone is doing bad C coding (e.g., strcpy() and similar), there is no good bucket for that. Likewise, misusing the platform APIs (e.g., Android, iOS, etc.) is not well covered. It's hard to place violations of platform best practices (e.g., with intents and broadcasts and so on).&lt;br /&gt;
&lt;br /&gt;
=Top Ten Scratchpad=&lt;br /&gt;
Here's some top-ten possible categories. This is a wiki. Edit them. Change them. Leave comments. Mark it up.&lt;br /&gt;
&lt;br /&gt;
==M1: Weak Server Side Controls                 ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M2: Insecure Data Storage                     ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M3: Insufficient Transport Layer Protection   ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M4: Unintended Data Leakage                   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M5: Poor Authorization and Authentication     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M6: Broken Cryptography                       ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M7: Client Side Injection                     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M8: Security Decisions Via Untrusted Inputs   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M9: Improper Session Handling                 ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M10: Lack of Binary Protections               ==&lt;br /&gt;
&lt;br /&gt;
(Jason) Regarding m10 - Several submissions reported m10 vulns. Unfortunately some were types of services such as binary reputation scanners, that do not have the ability to check for dynamic or code level findings. In order to fix this i recommend a name change or re-working of this category.  I want to separate out the delineation of Anti-exploit vs Code Obfuscation/Anti-reversing. Must talk to group about this.&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=188354</id>
		<title>Mobile Top Ten Contributions</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=188354"/>
				<updated>2015-01-21T17:45:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.&lt;br /&gt;
&lt;br /&gt;
== Project Leads ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
&lt;br /&gt;
== Wiki Content ==&lt;br /&gt;
&lt;br /&gt;
* Zach Lanier&lt;br /&gt;
* Mike Zuzman&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
* Rahil Parikh - Gotham Digital Science&lt;br /&gt;
* Ron Gutierrez - Gotham Digital Science&lt;br /&gt;
* [mailto:jonathan.carter@owasp.org Jonathan Carter - Arxan Technologies]&lt;br /&gt;
* [mailto:chad.butler@owasp.org Chad Butler - Concur Technologies]&lt;br /&gt;
&lt;br /&gt;
== Data ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]&lt;br /&gt;
* [https://twitter.com/andresitoath Andreas Athanasoulias &amp;amp; Syntax IT]&lt;br /&gt;
* [http://www.espheresecurity.com/ Hemil Shah and eSphere Security]&lt;br /&gt;
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]&lt;br /&gt;
* [http://www.arxan.com/ Arxan Technologies]&lt;br /&gt;
&lt;br /&gt;
== 2015 Data sets (raw) ==&lt;br /&gt;
&lt;br /&gt;
The 2015 data sets are stored at the below link:&lt;br /&gt;
&lt;br /&gt;
[https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0]&lt;br /&gt;
&lt;br /&gt;
== Additional Thanks ==&lt;br /&gt;
&lt;br /&gt;
* Jim Mannico&lt;br /&gt;
* Paco Hope&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=187635</id>
		<title>Mobile Top Ten Contributions</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=187635"/>
				<updated>2015-01-06T18:27:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.&lt;br /&gt;
&lt;br /&gt;
== Project Leads ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
&lt;br /&gt;
== Wiki Content ==&lt;br /&gt;
&lt;br /&gt;
* Zach Lanier&lt;br /&gt;
* Mike Zuzman&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
* Rahil Parikh - Gotham Digital Science&lt;br /&gt;
* Ron Gutierrez - Gotham Digital Science&lt;br /&gt;
* [mailto:jonathan.carter@owasp.org Jonathan Carter - Arxan Technologies]&lt;br /&gt;
* [mailto:chad.butler@owasp.org Chad Butler - Concur Technologies]&lt;br /&gt;
&lt;br /&gt;
== Data ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]&lt;br /&gt;
* [https://twitter.com/andresitoath Andreas Athanasoulias &amp;amp; Syntax IT]&lt;br /&gt;
* [http://www.espheresecurity.com/ Hemil Shah and eSphere Security]&lt;br /&gt;
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]&lt;br /&gt;
* [http://www.arxan.com/ Arxan Technologies]&lt;br /&gt;
&lt;br /&gt;
== 2015 Data sets (raw) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Thanks ==&lt;br /&gt;
&lt;br /&gt;
* Jim Mannico&lt;br /&gt;
* Paco Hope&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=184816</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=184816"/>
				<updated>2014-11-05T23:08:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: /* Call to Action for 2015 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013, we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our goals for the 2014 list included the following:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;&lt;br /&gt;
* Generation of more data; and&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we intend on releasing a Mobile Top Ten 2015 list following a similar approach of collecting data, grouping the data in logical and consistent ways.&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
== Call to Action for 2015 ==&lt;br /&gt;
We are currently looking for vendors, consultants, or other industry experts within the appsec community that are willing to participate in the OWASP Mobile Top Ten 2015.  Participation could include any of the following: gathering data, promoting awareness, etc.&lt;br /&gt;
&lt;br /&gt;
We have published a [https://docs.google.com/viewer?a=v&amp;amp;pid=forums&amp;amp;srcid=MTM2MzA3NTkyMzA4NjgxNjcwNjQBMTU5NDg1NTE3NTg0NTgyOTMzOTgBUmEtcUZEUFNUVzRKATAuMQFvd2FzcC5vcmcBdjI Call for Data document] and have also (in the name of transparency) [https://docs.google.com/spreadsheets/d/16bW_VhEIlFU4cfN8BOOk40-XN93FM0f0Sxcx67NwPcg/edit?usp=sharing published a document] which lists which entities/vendors/individuals/etc that we have reached out to. These requests were made because we know these entities to be thought leaders in the mobile application space. If we missed you, and you have data or feedback to contribute, we apologize. Please email one of us!&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Final List 2014 ==&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=184815</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=184815"/>
				<updated>2014-11-05T23:04:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013, we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our goals for the 2014 list included the following:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;&lt;br /&gt;
* Generation of more data; and&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we intend on releasing a Mobile Top Ten 2015 list following a similar approach of collecting data, grouping the data in logical and consistent ways.&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
== Call to Action for 2015 ==&lt;br /&gt;
We are currently looking for vendors, consultants, or other industry experts within the appsec community that are willing to participate in the OWASP Mobile Top Ten 2015.  Participation could include any of the following: gathering data, promoting awareness, etc.&lt;br /&gt;
&lt;br /&gt;
We have published a [https://docs.google.com/viewer?a=v&amp;amp;pid=forums&amp;amp;srcid=MTM2MzA3NTkyMzA4NjgxNjcwNjQBMTU5NDg1NTE3NTg0NTgyOTMzOTgBUmEtcUZEUFNUVzRKATAuMQFvd2FzcC5vcmcBdjI Call for Data document] and have also (in the name of transparency) [https://docs.google.com/spreadsheets/d/16bW_VhEIlFU4cfN8BOOk40-XN93FM0f0Sxcx67NwPcg/edit?usp=sharing published a document] which lists which entities/vendors/individuals/etc that we have reached out to. These requests were made because we know these companies to be thought leaders in the mobile application space. If we missed you, and you have data or feedback to contribute, we aplogize and please email one of us!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Final List 2014 ==&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IOS_Application_Security_Testing_Cheat_Sheet&amp;diff=179848</id>
		<title>IOS Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IOS_Application_Security_Testing_Cheat_Sheet&amp;diff=179848"/>
				<updated>2014-08-03T10:53:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DRAFT CHEAT SHEET - WORK IN PROGRESS ==&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This cheat sheet provides a checklist of tasks to be performed when testing an iOS application.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When assessing a mobile application several areas should be taken into account: client software, the communication channel and the server side infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing an iOS application usually requires a jailbroken device. (A device that not pose any restrictions on the software that can be installed on it.)&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:2-18-2013 4-47-36 AM.png]]&lt;br /&gt;
&lt;br /&gt;
== Information gathering ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Observe application behavior&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Determine the application’s data states (at rest, in transit or on display) and sensitivity &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify access methods&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify what frameworks are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify server side APIs that are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify what protocols are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify other applications or services with which the application interacts&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Decrypt Appstore binaries: the .ipa will be decrypted at runtime by the kernel’s mach loader. Cydia has several applications available: Crackulous, AppCrack and Clutch. Also, you can use GDB. The “cryptid” field of the LC_ENCRYPTION_INFO identifies if the application is encrypted or not. Use otool –l &amp;lt;app name&amp;gt; | grep –A 4 LC_ENCRYPTION_INFO&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Determine the architecture the application was compiled for: otool –f &amp;lt;app name&amp;gt; or lipo -info &amp;lt;app&amp;gt;.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Get information about what functions, classes and methods are referenced in the application and in the dynamically loaded libraries. Use nm &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;List the dynamic dependencies. Use otool –L &amp;lt;app name&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the load commands for the application. Use otool –l &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the runtime information from the compiled application. Identify each class compiled into the program and its associated methods, instance variables and properties. Use class-dump-z &amp;lt;app name&amp;gt;. That can be put that into a .h file which can be used later to create hooks for method swizzling or to simply make the methods of the app easier to read.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the keychain using dump_keychain to reveal application specific credentials and passwords if stored in the keychain. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Determine the security features in place:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Locate the PIE (Position Independent Executable) - an app compiled without PIE (using the “–fPIE –pie” flag) will load the executable at a fixed address. Check this using the command: otool –hv &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Stack smashing protection - specify the –fstack-protector-all compiler flag. A “canary” is placed on the stack to protect the saved base pointer, saved instruction pointer and function arguments. It will be verified upon the function return to see if it has been overwritten. Check this using: otool –I –v &amp;lt;app name&amp;gt; | grep stack . If the application was compiled with the stack smashing protection two undefined symbols will be present: “___stack_chk_fail” and “___stack_chk_guard”.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Application traffic analysis ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze error messages&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze cacheable information&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transport layer security (TLS version; NSURLRequest object )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Attack XML processors&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SQL injection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Privacy issues (sensitive information disclosure)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Improper session handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Decisions via untrusted inputs&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Broken cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Unmanaged code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;URL Schemes&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Push notifications&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authorization&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Session management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data storage&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data validation (input, output)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transport Layer protection – are the certificates validated, does the application implement Certificate Pinning&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Denial of service&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Business logic&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;UDID or MAC ID usage (privacy concerns)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Runtime analysis ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Disassemble the application (gdb)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze file system interaction&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Use the .h file generated with class-dump-z to create a method swizzling hook of some interesting methods to either examine the data as it flow through or create a &amp;quot;stealer&amp;quot; app.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze the application with a debugger (gdb): inspecting objects in memory and calling functions and methods; replacing variables and methods at runtime.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate CFStream and NSStream&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate protocol handlers (application: openURL - validates the source application that instantiated the URL request) for example: try to reconfigure the default landing page for the application using a malicious iframe.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Buffer overflows and memory corruption&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Client side injection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Runtime injections&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Having access to sources, test the memory by using Xcode Schemes&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Insecure data storage ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate log files(plugging the device in and pulling down logs with Xcode Organizer)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure data storage in application folder (var/mobile/Applications), caches, in backups (iTunes)&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Investigate custom created files&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze SQLlite database&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate property list files&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate file caching&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure data storage in keyboard cache&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate Cookies.binarycookies&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze iOS keychain (/private/var/Keychains/keychain-2.db) – when it is accessible and what information it contains; data stored in the keychain can only be accessible if the attacker has physical access to the device.&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Check for sensitive information in snapshots&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Audit data protection of files and keychain entries (To determine when a keychain item should be readable by an application check the data protection accessibility constants)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Tool&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Link&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Mallory proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://intrepidusgroup.com/insight/mallory/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Proxy for Binary protocols&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Charles/Burp proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.charlesproxy.com/  ;&lt;br /&gt;
http://www.portswigger.net/burp/&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Proxy for HTTP and HTTPS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OpenSSH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.openssh.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Connect to the iPhone remotely over SSH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sqlite3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.sqlite.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sqlite database client&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GNU Debugger&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.gnu.org/software/gdb/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;For run time analysis &amp;amp; reverse engineering&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Syslogd&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man8/syslogd.8.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;View iPhone logs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tcpdump&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.tcpdump.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Capture network traffic on phone&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Otool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man1/otool.1.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Odcctools: otool – object file displaying tool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Cycript &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.cycript.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A language designed to interact with Objective-C classes&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SSL Kill switch&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/iSECPartners/ios-ssl-kill-switch&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Blackbox tool to disable SSL certificate validation - including certificate pinning in NSURL &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Plutil&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://scw.us/iPhone/plutil/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;To view Plist files&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;nm&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Analysis tool to display the symbol table, which includes names of functions and methods, as well as their load addresses.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;sysctl&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://developer.apple.com/library/mac/#documentation/Darwin/Reference /ManPages/man8/sysctl.8.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A utility to read and change kernel state variables&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;dump_keychain&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/emonti/iOS_app_re_tools &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A utility to dump the keychain&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Filemon&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.newosxbook.com/files/filemon.iOS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Monitor realtime iOS file system&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;FileDP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.securitylearn.net/2012/10/18/extracting-data-protection-class-from-files-on-ios/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Audits data protection of files&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;BinaryCookieReader&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Read cookies.binarycookies files  &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;lsof ARM Binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/u35tpus/iosrep/tree/master/lsof&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; list of all open files and the processes that opened them  &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;lsock ARM Binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.newosxbook.com/index.php?page=downloads&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; monitor socket connections &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PonyDebugger Injected&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/dtrukr/PonyDebuggerInjected&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Injected via Cycript to enable remote debugging &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Weak Class Dump&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://raw.github.com/limneos/weak_classdump/master/weak_classdump.cy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Injected via Cycript to do class-dump (for when you cant un-encrypt the binary) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TrustME&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/intrepidusgroup/trustme&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Lower level tool to disable SSL certificate validation - including certificate pinning (for everything else but NSURL)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Mac Robber&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.sleuthkit.org/mac-robber/download.php&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; C code, forensic tool for imaging filesystems and producing a timeline &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;USBMux Proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/st3fan/usbmux-proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; command line tool to connect local TCP port sto ports on an iPhone or iPod Touch device over USB. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iFunBox&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.i-funbox.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Filesystem access (no jailbreak needed), USBMux Tunneler, .ipa installer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iNalyzer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://appsec-labs.com/iNalyzer/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iOS Penetration testing framework&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;removePIE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/peterfillmore/removePIE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Disables ASLR of an application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;snoop-it&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://code.google.com/p/snoop-it/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A tool to assist security assessments and dynamic analysis of iOS Apps, includes runtime views of obj-c classes and methods, and options to modify those values&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;idb&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/dmayer/idb&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A GUI (and cmdline) tool to simplify some common tasks for iOS pentesting and research.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Damn Vulnerable iOS Application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://damnvulnerableiosapp.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A purposefully vulnerable iOS application for learning iOS application assessment skills.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;introspy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/iSECPartners/Introspy-iOS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A security profiling tool revolved around hooking security based iOS APIs and logging their output for security analysis&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Articles ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.slideshare.net/jasonhaddix/pentesting-ios-applications&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Security_Testing_Guide&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://pen-testing.sans.org/blog/pen-testing/2011/10/13/mobile-application-assessments-attack-vectors-and-arsenal-inventory#&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.securitylearn.net/2012/09/07/penetration-testing-of-iphone-applications-part-3/&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jonathan Zdziarski “Hacking and securing iOS applications” (ch. 6,7,8)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.mdsec.co.uk/research/iOS_Application_Insecurity_wp_v1.0_final.pdf&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
Oana Cornea - oanacornea123[at]gmail.com&lt;br /&gt;
&lt;br /&gt;
Jason Haddix - jason.haddix[at]hp.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IOS_Application_Security_Testing_Cheat_Sheet&amp;diff=179847</id>
		<title>IOS Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IOS_Application_Security_Testing_Cheat_Sheet&amp;diff=179847"/>
				<updated>2014-08-03T10:48:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DRAFT CHEAT SHEET - WORK IN PROGRESS ==&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This cheat sheet provides a checklist of tasks to be performed when testing an iOS application.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When assessing a mobile application several areas should be taken into account: client software, the communication channel and the server side infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing an iOS application usually requires a jailbroken device. (A device that not pose any restrictions on the software that can be installed on it.)&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:2-18-2013 4-47-36 AM.png]]&lt;br /&gt;
&lt;br /&gt;
== Information gathering ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Observe application behavior&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Determine the application’s data states (at rest, in transit or on display) and sensitivity &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify access methods&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify what frameworks are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify server side APIs that are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify what protocols are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify other applications or services with which the application interacts&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Decrypt Appstore binaries: the .ipa will be decrypted at runtime by the kernel’s mach loader. Cydia has several applications available: Crackulous, AppCrack and Clutch. Also, you can use GDB. The “cryptid” field of the LC_ENCRYPTION_INFO identifies if the application is encrypted or not. Use otool –l &amp;lt;app name&amp;gt; | grep –A 4 LC_ENCRYPTION_INFO&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Determine the architecture the application was compiled for: otool –f &amp;lt;app name&amp;gt; or lipo -info &amp;lt;app&amp;gt;.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Get information about what functions, classes and methods are referenced in the application and in the dynamically loaded libraries. Use nm &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;List the dynamic dependencies. Use otool –L &amp;lt;app name&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the load commands for the application. Use otool –l &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the runtime information from the compiled application. Identify each class compiled into the program and its associated methods, instance variables and properties. Use class-dump-z &amp;lt;app name&amp;gt;. That can be put that into a .h file which can be used later to create hooks for method swizzling or to simply make the methods of the app easier to read.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the keychain using dump_keychain to reveal application specific credentials and passwords if stored in the keychain. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Determine the security features in place:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Locate the PIE (Position Independent Executable) - an app compiled without PIE (using the “–fPIE –pie” flag) will load the executable at a fixed address. Check this using the command: otool –hv &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Stack smashing protection - specify the –fstack-protector-all compiler flag. A “canary” is placed on the stack to protect the saved base pointer, saved instruction pointer and function arguments. It will be verified upon the function return to see if it has been overwritten. Check this using: otool –I –v &amp;lt;app name&amp;gt; | grep stack . If the application was compiled with the stack smashing protection two undefined symbols will be present: “___stack_chk_fail” and “___stack_chk_guard”.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Application traffic analysis ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze error messages&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze cacheable information&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transport layer security (TLS version; NSURLRequest object )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Attack XML processors&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SQL injection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Privacy issues (sensitive information disclosure)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Improper session handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Decisions via untrusted inputs&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Broken cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Unmanaged code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;URL Schemes&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Push notifications&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authorization&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Session management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data storage&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data validation (input, output)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transport Layer protection – are the certificates validated, does the application implement Certificate Pinning&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Denial of service&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Business logic&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;UDID or MAC ID usage (privacy concerns)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Runtime analysis ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Disassemble the application (gdb)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze file system interaction&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Use the .h file generated with class-dump-z to create a method swizzling hook of some interesting methods to either examine the data as it flow through or create a &amp;quot;stealer&amp;quot; app.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze the application with a debugger (gdb): inspecting objects in memory and calling functions and methods; replacing variables and methods at runtime.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate CFStream and NSStream&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate protocol handlers (application: openURL - validates the source application that instantiated the URL request) for example: try to reconfigure the default landing page for the application using a malicious iframe.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Buffer overflows and memory corruption&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Client side injection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Runtime injections&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Having access to sources, test the memory by using Xcode Schemes&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Insecure data storage ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate log files(plugging the device in and pulling down logs with Xcode Organizer)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure data storage in application folder (var/mobile/Applications), caches, in backups (iTunes)&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Investigate custom created files&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze SQLlite database&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate property list files&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate file caching&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure data storage in keyboard cache&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate Cookies.binarycookies&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze iOS keychain (/private/var/Keychains/keychain-2.db) – when it is accessible and what information it contains; data stored in the keychain can only be accessible if the attacker has physical access to the device.&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Check for sensitive information in snapshots&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Audit data protection of files and keychain entries (To determine when a keychain item should be readable by an application check the data protection accessibility constants)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Tool&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Link&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Mallory proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://intrepidusgroup.com/insight/mallory/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Proxy for Binary protocols&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Charles/Burp proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.charlesproxy.com/  ;&lt;br /&gt;
http://www.portswigger.net/burp/&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Proxy for HTTP and HTTPS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OpenSSH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.openssh.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Connect to the iPhone remotely over SSH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sqlite3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.sqlite.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sqlite database client&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GNU Debugger&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.gnu.org/software/gdb/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;For run time analysis &amp;amp; reverse engineering&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Syslogd&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man8/syslogd.8.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;View iPhone logs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tcpdump&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.tcpdump.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Capture network traffic on phone&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Otool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man1/otool.1.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Odcctools: otool – object file displaying tool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Cycript &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.cycript.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A language designed to interact with Objective-C classes&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SSL Kill switch&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/iSECPartners/ios-ssl-kill-switch&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Blackbox tool to disable SSL certificate validation - including certificate pinning in NSURL &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Plutil&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://scw.us/iPhone/plutil/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;To view Plist files&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;nm&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Analysis tool to display the symbol table, which includes names of functions and methods, as well as their load addresses.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;sysctl&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://developer.apple.com/library/mac/#documentation/Darwin/Reference /ManPages/man8/sysctl.8.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A utility to read and change kernel state variables&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;dump_keychain&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/emonti/iOS_app_re_tools &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A utility to dump the keychain&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Filemon&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.newosxbook.com/files/filemon.iOS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Monitor realtime iOS file system&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;FileDP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.securitylearn.net/2012/10/18/extracting-data-protection-class-from-files-on-ios/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Audits data protection of files&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;BinaryCookieReader&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Read cookies.binarycookies files  &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;lsof ARM Binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/u35tpus/iosrep/tree/master/lsof&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; list of all open files and the processes that opened them  &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;lsock ARM Binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.newosxbook.com/index.php?page=downloads&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; monitor socket connections &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PonyDebugger Injected&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/dtrukr/PonyDebuggerInjected&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Injected via Cycript to enable remote debugging &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Weak Class Dump&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://raw.github.com/limneos/weak_classdump/master/weak_classdump.cy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Injected via Cycript to do class-dump (for when you cant un-encrypt the binary) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TrustME&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/intrepidusgroup/trustme&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Lower level tool to disable SSL certificate validation - including certificate pinning (for everything else but NSURL)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Mac Robber&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.sleuthkit.org/mac-robber/download.php&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; C code, forensic tool for imaging filesystems and producing a timeline &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;USBMux Proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/st3fan/usbmux-proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; command line tool to connect local TCP port sto ports on an iPhone or iPod Touch device over USB. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iFunBox&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.i-funbox.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Filesystem access (no jailbreak needed), USBMux Tunneler, .ipa installer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iNalyzer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://appsec-labs.com/iNalyzer/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iOS Penetration testing framework&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;removePIE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/peterfillmore/removePIE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Disables ASLR of an application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;snoop-it&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://code.google.com/p/snoop-it/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A tool to assist security assessments and dynamic analysis of iOS Apps, includes runtime views of obj-c classes and methods, and options to modify those values&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;idb&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/dmayer/idb&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A GUI (and cmdline) tool to simplify some common tasks for iOS pentesting and research.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Damn Vulnerable iOS Application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://damnvulnerableiosapp.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A purposefully vulnerable iOS application for learning iOS application assessment skills.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Articles ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.slideshare.net/jasonhaddix/pentesting-ios-applications&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Security_Testing_Guide&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://pen-testing.sans.org/blog/pen-testing/2011/10/13/mobile-application-assessments-attack-vectors-and-arsenal-inventory#&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.securitylearn.net/2012/09/07/penetration-testing-of-iphone-applications-part-3/&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jonathan Zdziarski “Hacking and securing iOS applications” (ch. 6,7,8)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.mdsec.co.uk/research/iOS_Application_Insecurity_wp_v1.0_final.pdf&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
Oana Cornea - oanacornea123[at]gmail.com&lt;br /&gt;
&lt;br /&gt;
Jason Haddix - jason.haddix[at]hp.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IOS_Application_Security_Testing_Cheat_Sheet&amp;diff=179846</id>
		<title>IOS Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IOS_Application_Security_Testing_Cheat_Sheet&amp;diff=179846"/>
				<updated>2014-08-03T10:35:31Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DRAFT CHEAT SHEET - WORK IN PROGRESS ==&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This cheat sheet provides a checklist of tasks to be performed when testing an iOS application.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When assessing a mobile application several areas should be taken into account: client software, the communication channel and the server side infrastructure.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing an iOS application usually requires a jailbroken device. (A device that not pose any restrictions on the software that can be installed on it.)&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:2-18-2013 4-47-36 AM.png]]&lt;br /&gt;
&lt;br /&gt;
== Information gathering ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Observe application behavior&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Determine the application’s data states (at rest, in transit or on display) and sensitivity &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify access methods&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify what frameworks are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify server side APIs that are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify what protocols are in use&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identify other applications or services with which the application interacts&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Decrypt Appstore binaries: the .ipa will be decrypted at runtime by the kernel’s mach loader. Cydia has several applications available: Crackulous, AppCrack and Clutch. Also, you can use GDB. The “cryptid” field of the LC_ENCRYPTION_INFO identifies if the application is encrypted or not. Use otool –l &amp;lt;app name&amp;gt; | grep –A 4 LC_ENCRYPTION_INFO&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Determine the architecture the application was compiled for: otool –f &amp;lt;app name&amp;gt; or lipo -info &amp;lt;app&amp;gt;.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Get information about what functions, classes and methods are referenced in the application and in the dynamically loaded libraries. Use nm &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;List the dynamic dependencies. Use otool –L &amp;lt;app name&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the load commands for the application. Use otool –l &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the runtime information from the compiled application. Identify each class compiled into the program and its associated methods, instance variables and properties. Use class-dump-z &amp;lt;app name&amp;gt;. That can be put that into a .h file which can be used later to create hooks for method swizzling or to simply make the methods of the app easier to read.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Dump the keychain using dump_keychain to reveal application specific credentials and passwords if stored in the keychain. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
Determine the security features in place:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Locate the PIE (Position Independent Executable) - an app compiled without PIE (using the “–fPIE –pie” flag) will load the executable at a fixed address. Check this using the command: otool –hv &amp;lt;app name&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Stack smashing protection - specify the –fstack-protector-all compiler flag. A “canary” is placed on the stack to protect the saved base pointer, saved instruction pointer and function arguments. It will be verified upon the function return to see if it has been overwritten. Check this using: otool –I –v &amp;lt;app name&amp;gt; | grep stack . If the application was compiled with the stack smashing protection two undefined symbols will be present: “___stack_chk_fail” and “___stack_chk_guard”.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Application traffic analysis ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze error messages&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze cacheable information&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transport layer security (TLS version; NSURLRequest object )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Attack XML processors&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;SQL injection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Privacy issues (sensitive information disclosure)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Improper session handling&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Decisions via untrusted inputs&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Broken cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Unmanaged code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;URL Schemes&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Push notifications&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authorization&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Session management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data storage&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data validation (input, output)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transport Layer protection – are the certificates validated, does the application implement Certificate Pinning&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Denial of service&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Business logic&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;UDID or MAC ID usage (privacy concerns)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Runtime analysis ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Disassemble the application (gdb)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze file system interaction&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Use the .h file generated with class-dump-z to create a method swizzling hook of some interesting methods to either examine the data as it flow through or create a &amp;quot;stealer&amp;quot; app.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze the application with a debugger (gdb): inspecting objects in memory and calling functions and methods; replacing variables and methods at runtime.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate CFStream and NSStream&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate protocol handlers (application: openURL - validates the source application that instantiated the URL request) for example: try to reconfigure the default landing page for the application using a malicious iframe.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Buffer overflows and memory corruption&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Client side injection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Runtime injections&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Having access to sources, test the memory by using Xcode Schemes&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Insecure data storage ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate log files(plugging the device in and pulling down logs with Xcode Organizer)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure data storage in application folder (var/mobile/Applications), caches, in backups (iTunes)&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Investigate custom created files&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze SQLlite database&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate property list files&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate file caching&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure data storage in keyboard cache&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Investigate Cookies.binarycookies&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyze iOS keychain (/private/var/Keychains/keychain-2.db) – when it is accessible and what information it contains; data stored in the keychain can only be accessible if the attacker has physical access to the device.&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Check for sensitive information in snapshots&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Audit data protection of files and keychain entries (To determine when a keychain item should be readable by an application check the data protection accessibility constants)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Tool&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Link&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Mallory proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://intrepidusgroup.com/insight/mallory/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Proxy for Binary protocols&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Charles/Burp proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.charlesproxy.com/  ;&lt;br /&gt;
http://www.portswigger.net/burp/&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Proxy for HTTP and HTTPS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OpenSSH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.openssh.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Connect to the iPhone remotely over SSH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sqlite3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.sqlite.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sqlite database client&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GNU Debugger&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.gnu.org/software/gdb/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;For run time analysis &amp;amp; reverse engineering&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Syslogd&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man8/syslogd.8.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;View iPhone logs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tcpdump&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.tcpdump.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Capture network traffic on phone&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Otool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man1/otool.1.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Odcctools: otool – object file displaying tool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Cycript &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.cycript.org/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A language designed to interact with Objective-C classes&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SSL Kill switch&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/iSECPartners/ios-ssl-kill-switch&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Blackbox tool to disable SSL certificate validation - including certificate pinning in NSURL &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Plutil&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://scw.us/iPhone/plutil/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;To view Plist files&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;nm&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Analysis tool to display the symbol table, which includes names of functions and methods, as well as their load addresses.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;sysctl&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://developer.apple.com/library/mac/#documentation/Darwin/Reference /ManPages/man8/sysctl.8.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A utility to read and change kernel state variables&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;dump_keychain&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/emonti/iOS_app_re_tools &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A utility to dump the keychain&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Filemon&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.newosxbook.com/files/filemon.iOS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Monitor realtime iOS file system&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;FileDP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.securitylearn.net/2012/10/18/extracting-data-protection-class-from-files-on-ios/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Audits data protection of files&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;BinaryCookieReader&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Read cookies.binarycookies files  &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;lsof ARM Binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/u35tpus/iosrep/tree/master/lsof&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; list of all open files and the processes that opened them  &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;lsock ARM Binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.newosxbook.com/index.php?page=downloads&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; monitor socket connections &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PonyDebugger Injected&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/dtrukr/PonyDebuggerInjected&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Injected via Cycript to enable remote debugging &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Weak Class Dump&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://raw.github.com/limneos/weak_classdump/master/weak_classdump.cy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Injected via Cycript to do class-dump (for when you cant un-encrypt the binary) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TrustME&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/intrepidusgroup/trustme&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; Lower level tool to disable SSL certificate validation - including certificate pinning (for everything else but NSURL)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Mac Robber&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.sleuthkit.org/mac-robber/download.php&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; C code, forensic tool for imaging filesystems and producing a timeline &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;USBMux Proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/st3fan/usbmux-proxy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; command line tool to connect local TCP port sto ports on an iPhone or iPod Touch device over USB. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iFunBox&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;http://www.i-funbox.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Filesystem access (no jailbreak needed), USBMux Tunneler, .ipa installer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iNalyzer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://appsec-labs.com/iNalyzer/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;iOS Penetration testing framework&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;removePIE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/peterfillmore/removePIE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Disables ASLR of an application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;snoop-it&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://code.google.com/p/snoop-it/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A tool to assist security assessments and dynamic analysis of iOS Apps, includes runtime views of obj-c classes and methods, and options to modify those values&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;idb&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;https://github.com/dmayer/idb&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A GUI (and cmdline) tool to simplify some common tasks for iOS pentesting and research.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Articles ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.slideshare.net/jasonhaddix/pentesting-ios-applications&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Security_Testing_Guide&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://pen-testing.sans.org/blog/pen-testing/2011/10/13/mobile-application-assessments-attack-vectors-and-arsenal-inventory#&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.securitylearn.net/2012/09/07/penetration-testing-of-iphone-applications-part-3/&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jonathan Zdziarski “Hacking and securing iOS applications” (ch. 6,7,8)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;http://www.mdsec.co.uk/research/iOS_Application_Insecurity_wp_v1.0_final.pdf&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
Oana Cornea - oanacornea123[at]gmail.com&lt;br /&gt;
&lt;br /&gt;
Jason Haddix - jason.haddix[at]hp.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Project&amp;diff=177760</id>
		<title>OWASP Mobile Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Project&amp;diff=177760"/>
				<updated>2014-06-29T21:33:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Home =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|2400x160px|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Security Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications.  Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.&lt;br /&gt;
&lt;br /&gt;
Our primary focus is at the application layer.  While we take into consideration the underlying mobile platform and carrier inherent risks when threat modeling and building controls, we are targeting the areas that the average developer can make a difference.  Additionally, we focus not only on the mobile applications deployed to end user devices, but also on the broader server-side infrastructure which the mobile apps communicate with.  We focus heavily on the integration between the mobile application, remote authentication services, and cloud platform-specific features.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We have a Google Doc where anyone who wants to be involved with the project can add their thoughts, suggestions, and take ownership of initiatives - [https://docs.google.com/document/d/1bScrvrLJLOHcSbztjBxYoN-jN3kR8bViy9tF8Nx0c08/edit Click here]. There are various tasks that people have started over the past 6 months with varying levels of quality and completeness.'''&lt;br /&gt;
&lt;br /&gt;
This project is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads or feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]] [https://lists.owasp.org/mailman/listinfo/owasp-mobile-security-project Project Email List]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jack Mannino&lt;br /&gt;
| email = Jack@nvisiumsecurity.com&lt;br /&gt;
| username = Jack Mannino&lt;br /&gt;
}} &amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact | name = Mike Zusman&lt;br /&gt;
| email = mike.zusman@owasp.org&lt;br /&gt;
| username = schmoilito }}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Tony DeLaGrange&lt;br /&gt;
| email = mobisec@secureideas.net&lt;br /&gt;
| username = Tony DeLaGrange&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Sarath Geethakumar&lt;br /&gt;
| email = sarath.geethakumar@owasp.org&lt;br /&gt;
| username =  Sarath Geethakumar&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Tom Eston&lt;br /&gt;
| email = teston@securestate.com&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Don Williams&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jason Haddix&lt;br /&gt;
| email = jason.haddix@hp.com&lt;br /&gt;
| username =  Jason Haddix&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
== Contributors ==&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Zach Lanier&lt;br /&gt;
| email = zach.lanier@n0where.org&lt;br /&gt;
| username = Zach_Lanier&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jim Manico&lt;br /&gt;
| email = jim.manico@owasp.org&lt;br /&gt;
| username = jmanico&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Ludovic Petit&lt;br /&gt;
| email = ludovic.petit@owasp.org&lt;br /&gt;
| username =  Ludovic Petit&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Swapnil Deshmukh&lt;br /&gt;
| email = sd.swapz@gmail.com&lt;br /&gt;
| username =  Swapnil Deshmukh&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Beau Woods&lt;br /&gt;
| email = owasp@beauwoods.com&lt;br /&gt;
| username =  Beau Woods&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jonathan Carter&lt;br /&gt;
| email = jonathan.carter@owasp.org&lt;br /&gt;
| username =  Jonathan Carter&lt;br /&gt;
}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 Mobile Risks =&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ==&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
*** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2014 Roadmap ==&lt;br /&gt;
&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
= Mobile Tools =&lt;br /&gt;
== iMAS  ==&lt;br /&gt;
&lt;br /&gt;
iMAS is a collaborative research project from the MITRE Corporation focused on open source iOS security controls. Today, iOS meets the enterprise security needs of customers, however many security experts cite critical vulnerabilities and have demonstrated exploits, which pushes enterprises to augment iOS deployments with commercial solutions. The iMAS intent is to protect iOS applications and data beyond the Apple provided security model and reduce the adversary’s ability and efficiency to perform recon, exploitation, control and execution on iOS mobile applications. iMAS will transform the effectiveness of the existing iOS security model across major vulnerability areas including the System Passcode, jailbreak, debugger / run-time, flash storage, and the system keychain. Research outcomes include an open source secure application framework, including an application container, developer and validation tools/techniques.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project iMas Project Page]&lt;br /&gt;
&lt;br /&gt;
The source code for iMAS is available on GitHub: [https://github.com/project-imas/about iMAS Source Code]&lt;br /&gt;
&lt;br /&gt;
== GoatDroid  ==&lt;br /&gt;
&lt;br /&gt;
OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. GoatDroid requires minimal dependencies and is ideal for both Android beginners as well as more advanced users. The project currently includes two applications: FourGoats, a location-based social network, and Herd Financial, a mobile banking application. There are also several features that greatly simplify usage within a training environment or for absolute beginners who want a good introduction to working with the Android platform.&lt;br /&gt;
&lt;br /&gt;
As the Android SDK introduces new features, the GoatDroid contributors will strive to implement up-to-date lessons that can educate developers and security testers on new security issues. The project currently provides coverage for most of the OWASP Top 10 Mobile Risks and also includes a bunch of other problems as well.&lt;br /&gt;
&lt;br /&gt;
You can find GoatDroid on GitHub: [https://github.com/jackMannino/OWASP-GoatDroid-Project GoatDroid Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project GoatDroid Project Page]&lt;br /&gt;
&lt;br /&gt;
== iGoat ==&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
# Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iGoat_Project iGoat Project Page]&lt;br /&gt;
&lt;br /&gt;
The iGoat source code is available on Google Code [http://code.google.com/p/owasp-igoat/ iGoat Source Code]&lt;br /&gt;
&lt;br /&gt;
== Damn Vulnerable iOS Application ==&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
The current challenge categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com DVIA Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_DVIA DVIA OWASP Project Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/prateek147/DVIA DVIA Github Source]&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com/#learn DVIA Learning Resources]&lt;br /&gt;
&lt;br /&gt;
== MobiSec ==&lt;br /&gt;
&lt;br /&gt;
The MobiSec Live Environment Mobile Testing Framework project is a live environment for testing mobile environments, including devices, applications, and supporting infrastructure. The purpose is to provide attackers and defenders the ability to test their mobile environments to identify design weaknesses and vulnerabilities. The MobiSec Live Environment provides a single environment for testers to leverage the best of all available open source mobile testing tools, as well as the ability to install additional tools and platforms, that will aid the penetration tester through the testing process as the environment is structured and organized based on an industry­‐proven testing framework. Using a live environment provides penetration testers the ability to boot the MobiSec Live Environment on any Intel-­based system from a DVD or USB flash drive, or run the test environment within a virtual machine. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_MobiSec Project Page]&lt;br /&gt;
&lt;br /&gt;
MobiSec can be downloaded from Sourceforge: [http://sourceforge.net/p/mobisec/wiki/Home/ MobiSec Download Repository]&lt;br /&gt;
&lt;br /&gt;
== Androick  ==&lt;br /&gt;
&lt;br /&gt;
Androick is a collaborative research project from PHONESEC Ltd. With our tool, you can evaluate some risks on Android mobile applications.&lt;br /&gt;
Androick is a tool that allows any user to analyze an Android application. It can get the apk file, all the datas and the databases in sqlite3 and csv format. &lt;br /&gt;
Only for Pentesters or Researchers.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Androick_Project Androick Project Page]&lt;br /&gt;
== OWASP Summer of Code 2008 ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation sponsored the OWASP Application Security Verification Standard Project during the OWASP Summer of Code 2008.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Mobile Security Testing =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
A major priority of the OWASP Mobile Security Project is to help standardize and disseminate mobile application testing methodologies. While specific techniques exist for individual platforms, a general mobile threat model can be used to assist test teams in creating a mobile security testing methodology for any platform. The outline which follows describes a general mobile application testing methodology which can be tailored to meet the security tester’s needs. It is high level in some places, and over time will be customized on a per-platform basis.&lt;br /&gt;
&lt;br /&gt;
This guide is targeted towards application developers and security testers. Developers can leverage this guide to ensure that they are not introducing the security flaws described within the guide. Security testers can use it as a reference guide to ensure that they are adequately assessing the mobile application attack surface. The ideal mobile assessment combines dynamic analysis, static analysis, and forensic analysis to ensure that the majority of the mobile application attack surface is covered. &lt;br /&gt;
&lt;br /&gt;
On some platforms, it may be necessary to have root user or elevated privileges in order to perform all of the the required analysis on devices during testing. Many applications write information to areas that cannot be accessed without a higher level of access than the standard shell or application user generally has. For steps that generally require elevated privileges, it will be stated that this is the case. &lt;br /&gt;
&lt;br /&gt;
This guide is broken up into three sections:&lt;br /&gt;
*'''Information Gathering-''' describes the steps and things to consider when you are in the early stage reconnaissance and mapping phases of testing as well as determining the application’s magnitude of effort and scoping.&lt;br /&gt;
*'''Static Analysis'''- Analyzing raw mobile source code, decompiled or disassembled code. &lt;br /&gt;
*'''Dynamic Analysis''' - executing an application either on the device itself or within a simulator/emulator and interacting with the remote services with which the application communicates. This includes assessing the application’s local interprocess communication surface, forensic analysis of the local filesystem, and assessing remote service dependencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How To Use This Resource ===&lt;br /&gt;
&lt;br /&gt;
As this guide is not platform specific, you will need to know the appropriate techniques &amp;amp; tools for your target platform. The OWASP Mobile Security Project has also developed a number of other supporting resources which may be able to be leveraged for your needs.&lt;br /&gt;
&lt;br /&gt;
'''In this current draft release, the guide is a work in progress. We need additional contributors to help fill in the blanks. If you think something is missing (there certainly is), add it.'''&lt;br /&gt;
&lt;br /&gt;
As this guide is not platform specific, you will need to know the appropriate techniques &amp;amp; tools for your target platform. The OWASP Mobile Security Project has also developed a number of other supporting resources which may be able to be leveraged for your needs,&lt;br /&gt;
&lt;br /&gt;
The steps required to properly test an Android application are very different than those of testing an iOS application. Likewise, Windows Phone is very different from the other platforms. Mobile security testing requires a diverse skillset over many differing operating systems and a critical ability to analyze various types of source code.&lt;br /&gt;
&lt;br /&gt;
In many cases, a mobile application assessment will require coverage in all three areas identified within this testing reference. A dynamic assessment will benefit from an initial thorough attempt at Information Gathering, some level of static analysis against the application’s binary, and a forensic review of the data created and modified by the application’s runtime behavior.&lt;br /&gt;
&lt;br /&gt;
Please use this guide in an iterative fashion, where work in one area may require revisiting previous testing steps. As an example, after completing a transaction you may likely need to perform additional forensic analysis on the device to ensure that sensitive data is removed as expected and not cached in an undesired fashion. As you learn more about the application at runtime, you may wish to examine additional parts of the code to determine the best way to evade a specific control. Likewise, during static analysis it may be helpful to populate the application with certain data in order to prove or refute the existence of a security flaw.&lt;br /&gt;
&lt;br /&gt;
In the future, contributors to the testing guide should consider adding entries under each section relevant to a specific platform. Over time, OWASP contributors will write platform specific guides and expand upon this body of knowledge. &lt;br /&gt;
&lt;br /&gt;
If a specific area of interest is not covered in this guide, please feel free to either: &lt;br /&gt;
&lt;br /&gt;
*write the material yourself by registering for a wiki account and contributing content: [https://www.owasp.org/index.php/Special:RequestAccount Wiki Registration]&lt;br /&gt;
*bring this up as a topic on the Mobile Project’s mailing list: [https://lists.owasp.org/mailman/listinfo/owasp-mobile-security-project Mobile Mailing List]&lt;br /&gt;
&lt;br /&gt;
Collaboration on building the guide is being performed within Google Docs. You can find the latest and greatest material here: [https://docs.google.com/document/m/?id=1N7zMXlFHtWfc00xa6lRHnVB60U4BZO4SbUrWYMbojVM&amp;amp;pli=1&amp;amp;login=1 Testing Guide Google Doc]&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
As a result of this initial information gathering exercise, the tester will be better prepared for the future testing phases. Testers, Developers and Security people often fail to take the time to learn the target application and supporting infrastructure, opting to dive in blind, possibly losing valuable time and missing possible attack vectors. Without a solid understanding of how the application “should” work as well as the technologies in use, the tester will not be able to identify when the application behaves in a manner that it “shouldn’t”.&lt;br /&gt;
&lt;br /&gt;
Prerequisites of this phase may require specific operating systems, platform specific software development kits (SDK’s), rooted or jailbroken devices, the ability to man-in-the-middle secure communications (i.e. HTTPS) and bypass invalid certificate checks.&lt;br /&gt;
&lt;br /&gt;
*Manually navigate through the running application to understand the basic functionality and workflow of the application. This can be performed on a real device or within a simulator/emulator. For deeper understanding of application functionality tester can proxy and sniff all network traffic from either a physical mobile device or an emulator/simulator recording and logging traffic (if your proxy tool permits logging, which most should).&lt;br /&gt;
&lt;br /&gt;
*Identify the networking interfaces used by the application, for instance:&lt;br /&gt;
**Mobile Communication (GSM, GPRS, EDGE, LTE)&lt;br /&gt;
**Wireless (Wi-Fi (802.11 standards), Bluetooth, NFC)&lt;br /&gt;
**Virtual Interfaces (i.e. VPN)&lt;br /&gt;
&lt;br /&gt;
*Determine what the application supports for access 3G, 4G, wifi and or others&lt;br /&gt;
&lt;br /&gt;
*What networking protocols are in use?&lt;br /&gt;
**Are secure protocols used where needed?&lt;br /&gt;
**Can they be switched with insecure protocols?&lt;br /&gt;
&lt;br /&gt;
*Does the application perform commerce transactions?&lt;br /&gt;
**Credit card transactions and/or stored payment information (certain industry regulations may be required (i.e. PCI DSS)).&lt;br /&gt;
**In-app purchasing of goods or features&lt;br /&gt;
**Make note for future phases to determine does the application store payment information? How is payment information secured?&lt;br /&gt;
&lt;br /&gt;
*Monitor and identify the hardware components that the application may potentially interact with&lt;br /&gt;
**NFC&lt;br /&gt;
**Bluetooth&lt;br /&gt;
**GPS&lt;br /&gt;
**Camera&lt;br /&gt;
**Microphone&lt;br /&gt;
**Sensors&lt;br /&gt;
**USB&lt;br /&gt;
&lt;br /&gt;
*Perform open source intelligence gathering (search engines, source code repositories, developer forums, etc.) to identify source code or configuration information that may be exposed (i.e. 3rd party components integrated within the application)&lt;br /&gt;
&lt;br /&gt;
*What frameworks are in use?&lt;br /&gt;
&lt;br /&gt;
*Identify if the application appears to interact with any other applications, services, or data such as:&lt;br /&gt;
**Telephony (SMS, phone)&lt;br /&gt;
**Contacts&lt;br /&gt;
**Auto correct / dictionary services&lt;br /&gt;
**Receiving data from apps and other on-device services&lt;br /&gt;
**Google Wallet&lt;br /&gt;
**iCloud&lt;br /&gt;
**Social networks (i.e. Facebook, Twitter, LinkedIn, Google+)&lt;br /&gt;
**Dropbox&lt;br /&gt;
**Evernote&lt;br /&gt;
**Email&lt;br /&gt;
**Etc.&lt;br /&gt;
&lt;br /&gt;
*Can you determine anything about the server side application environment?&lt;br /&gt;
**Hosting provider (AWS, App Engine, Heroku, Rackspace, Azure, etc.)&lt;br /&gt;
**Development environment (Rails, Java, Django, ASP.NET, etc.)&lt;br /&gt;
**Does the application leverage Single Sign On or Authentication APIs (Google Apps, Facebook, iTunes, OAuth, etc.)&lt;br /&gt;
**Any other APIs in use&lt;br /&gt;
***Payment gateways&lt;br /&gt;
***SMS messaging&lt;br /&gt;
***Social networks&lt;br /&gt;
***Cloud file storage&lt;br /&gt;
***Ad networks&lt;br /&gt;
&lt;br /&gt;
*Perform a thorough crawl of exposed web resources and sift through the requests and responses to identify potentially interesting data or behavior&lt;br /&gt;
**Leaking sensitive information (i.e. credentials) in the response&lt;br /&gt;
**Resources not exposed through the UI&lt;br /&gt;
**Error messages&lt;br /&gt;
**Cacheable information&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Static Analysis ==&lt;br /&gt;
&lt;br /&gt;
There are two primary ways static analysis will generally be performed on a mobile application: &lt;br /&gt;
#Analyzing source code obtained from development team (prefered) &lt;br /&gt;
#Using a compiled binary. &lt;br /&gt;
&lt;br /&gt;
Some level of static analysis should be performed for both dynamic and forensic analysis, as the application’s code will almost always provide valuable information to the tester (i.e. logic, backend targets, APIs, etc).&lt;br /&gt;
&lt;br /&gt;
In scenarios where the primary goal is to identify programmatic examples of security flaws, your best bet is to review pure source code as opposed to reverse engineering compiled software. For source code reviews, it is highly beneficial to have access to either a development or production instance of any web services. This includes both source code and a working test environment to perform the assessment within in order to expedite understanding of the code.&lt;br /&gt;
&lt;br /&gt;
=== Getting Started ===&lt;br /&gt;
*If the source is not directly available, decompile or disassemble the application’s binary&lt;br /&gt;
**extract the application from the device&lt;br /&gt;
**follow the appropriate steps for your platform’s application reverse engineering&lt;br /&gt;
**some applications may also require decryption prior to reverse engineering (note: decryption and code obfuscation are not the same thing)&lt;br /&gt;
&lt;br /&gt;
*Review the permissions the application requests as well as the resources that it is authorized to access (i.e. AndroidManifest.xml, iOS Entitlements)&lt;br /&gt;
&lt;br /&gt;
*Are there any easy to identify misconfigurations within the application found within the configuration files? Debugging flags set, world readable/writable permissions, etc.&lt;br /&gt;
&lt;br /&gt;
*What frameworks are in use? Is the application built using a cross-platform framework?&lt;br /&gt;
&lt;br /&gt;
*Identify the libraries in use including both platform provided as well as third party. Perform a quick review on the web to determine if these libraries:&lt;br /&gt;
**are up to date&lt;br /&gt;
**are free of vulnerabilities&lt;br /&gt;
**expose functionality that requires elevated privileges (access to location or contact data)&lt;br /&gt;
**native code&lt;br /&gt;
&lt;br /&gt;
*Does the application check for rooted/jailbroken devices? How is this done? How can this be circumvented? Is it as easy as changing the case of a file name or name of executable or path?&lt;br /&gt;
&lt;br /&gt;
*Determine what types of objects are implemented to create the various views within the application. This may significantly alter your test cases, as some views implement web browser functionality while others are native UI controls only.&lt;br /&gt;
&lt;br /&gt;
*Is all code expected to run within the platform’s standard runtime environment, or are some files/libraries dynamically loaded or called outside of that environment at runtime?&lt;br /&gt;
&lt;br /&gt;
*Attempt to match up every permission that the application requests with an actual concrete implementation of it within the application. Often, developers request more permission than they actually need. Identify if the same functionality could be enabled with lesser privileges.&lt;br /&gt;
&lt;br /&gt;
*Locate hard coded secrets within the application such as API keys, credentials, or proprietary business logic.&lt;br /&gt;
&lt;br /&gt;
*Identify every entry point for untrusted data entry and determine how it enforces access controls, validates and sanitizes inbound data, and passes the data off to other interpreters&lt;br /&gt;
**From web service calls&lt;br /&gt;
**Receiving data from other apps and on-device services&lt;br /&gt;
**Inbound SMS messages&lt;br /&gt;
**Reading information from the filesystem&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
&lt;br /&gt;
*Locate the code which handles user authentication through the UI. Assess the possible methods of user impersonation via vectors such as parameter tampering, replay attacks, and brute force attacks.&lt;br /&gt;
&lt;br /&gt;
*Determine if the application utilizes information beyond username/password such as&lt;br /&gt;
**contextual information (i.e.- device identifiers, location)&lt;br /&gt;
**certificates&lt;br /&gt;
**tokens&lt;br /&gt;
&lt;br /&gt;
*Does the application utilize visual swipe or touch passwords vs. conventional usernames and passwords?&lt;br /&gt;
**Assess the method of mapping the visual objects to an authentication string to determine if adequate entropy exists&lt;br /&gt;
&lt;br /&gt;
*Does the application implement functionality that permits inbound connections from other devices? (i.e.- Wi-Fi Direct, Android Beam, network services)&lt;br /&gt;
**Does the application properly authenticate the remote user or peer prior to granting access to device resources?&lt;br /&gt;
**How does the application handle excessive failed attempts at authentication?&lt;br /&gt;
**are failed attempts logged?&lt;br /&gt;
**what mechanisms exist to inform the user of a potential attack?&lt;br /&gt;
&lt;br /&gt;
*Single Sign On, e.g.&lt;br /&gt;
**OAuth&lt;br /&gt;
**Facebook&lt;br /&gt;
**Google Apps&lt;br /&gt;
&lt;br /&gt;
*SMS&lt;br /&gt;
**How is the sender authenticated?&lt;br /&gt;
***password&lt;br /&gt;
***header information&lt;br /&gt;
***Other mechanism?&lt;br /&gt;
**Are one time passwords (OTP) used or is other sensitive account data transmitted via SMS?&lt;br /&gt;
***Can other applications access this data?&lt;br /&gt;
&lt;br /&gt;
*Push Notifications&lt;br /&gt;
**If the application consumes information via push notifications, how does the application verify the identity of the sender?&lt;br /&gt;
&lt;br /&gt;
=== Authorization ===&lt;br /&gt;
*Review file permissions for files created at runtime&lt;br /&gt;
&lt;br /&gt;
*Determine if it is possible to access functionality not intended for your role&lt;br /&gt;
&lt;br /&gt;
**Identify if the application has role specific functionality within the mobile application&lt;br /&gt;
&lt;br /&gt;
**Locate any potential flags or values that may be set on the client from any untrusted source that can be a point of privilege elevation such as&lt;br /&gt;
***databases&lt;br /&gt;
***flat files&lt;br /&gt;
***HTTP responses&lt;br /&gt;
&lt;br /&gt;
**Find places within an application that were not anticipated being directly accessed without following the application’s intended workflow&lt;br /&gt;
&lt;br /&gt;
*Licensing&lt;br /&gt;
**Can licensing checks be defeated locally to obtain access to paid-for data resources? (i.e.- patching a binary, modifying it at runtime, or by modifying a local configuration file)&lt;br /&gt;
**Does the code suggest that licensed content is served with a non-licensed app but restricted by UI controls only?&lt;br /&gt;
**Are licensing checks performed properly by the server or platform licensing services?&lt;br /&gt;
**How does the application detect and respond to tampering?&lt;br /&gt;
***Are alerts sent to and expected by the developer?&lt;br /&gt;
***Does the application fail open or fail closed?&lt;br /&gt;
***Does the application wipe its data?&lt;br /&gt;
&lt;br /&gt;
=== Session Management ===&lt;br /&gt;
&lt;br /&gt;
*Ensure that sessions time out locally as well as server side&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information utilized within the application flushed from memory upon session expiration?&lt;br /&gt;
&lt;br /&gt;
=== Data Storage ===&lt;br /&gt;
&lt;br /&gt;
*Encryption&lt;br /&gt;
**Are the algorithms used “best of breed” or do they contain known issues?&lt;br /&gt;
**How are keys derived from i.e. a password?&lt;br /&gt;
**Based on the algorithms and approaches used to encrypt data, do implementation issues exist that degrade the effectiveness of encryption?&lt;br /&gt;
**How are keys managed and stored on the device? Can this reduce the complexity in breaking the encryption?&lt;br /&gt;
&lt;br /&gt;
*Identify if the application utilizes storage areas external to the “sandboxed” locations to store unencrypted data such as:&lt;br /&gt;
**Places with limited access control granularity (SD card, tmp directories, etc.)&lt;br /&gt;
**Directories that may end up in backups or other undesired locations (iTunes backup, external storage, etc.)&lt;br /&gt;
**Cloud storage services such as Dropbox, Google Drive, or S3&lt;br /&gt;
&lt;br /&gt;
*Does the application write sensitive information to the file system at any point, such as:&lt;br /&gt;
**Credentials&lt;br /&gt;
***Username and/or password&lt;br /&gt;
***API keys&lt;br /&gt;
***Authentication tokens&lt;br /&gt;
**Payment information&lt;br /&gt;
**Patient data&lt;br /&gt;
**Signature files&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information written to data stores via platform exposed APIs such as contacts?&lt;br /&gt;
&lt;br /&gt;
=== Information Disclosure ===&lt;br /&gt;
&lt;br /&gt;
*Logs&lt;br /&gt;
**Does the application log data? Is sensitive information accessible?&lt;br /&gt;
**How are the logs accessed, if so, and by which mechanism/functionality? Is log access protected?&lt;br /&gt;
**Can any of the logged information be considered a privacy violation?&lt;br /&gt;
**Is the device identifier sent that could be used to identify the user? (i.e.UDID in Apple devices)&lt;br /&gt;
&lt;br /&gt;
*Caches&lt;br /&gt;
**Predictive text&lt;br /&gt;
**Location information&lt;br /&gt;
**Copy and paste&lt;br /&gt;
**Application snapshot&lt;br /&gt;
**Browser cache&lt;br /&gt;
**Non-standard cache locations (i.e the various SQLite databases that apps can create if they use HTML UI components)&lt;br /&gt;
&lt;br /&gt;
*Exceptions&lt;br /&gt;
**Does sensitive data leak in crash logs?&lt;br /&gt;
&lt;br /&gt;
*Third Party Libraries and APIs&lt;br /&gt;
**What permissions do they require?&lt;br /&gt;
**Do they access or transmit sensitive information?&lt;br /&gt;
Review licensing requirements for any potential violations.&lt;br /&gt;
**Can their runtime behavior expose users to privacy issues and unauthorized tracking?&lt;br /&gt;
&lt;br /&gt;
=== Web Application Issues ===&lt;br /&gt;
&lt;br /&gt;
*XSS and HTML Injection&lt;br /&gt;
**Identify places where the application passes untrusted data into a web view or browser&lt;br /&gt;
**Determine if the application properly output encodes or sanitizes the data within the appropriate context&lt;br /&gt;
*Command Injection (if the application utilizes a shell)&lt;br /&gt;
**Where the application permits usage of the shell, identify the entry points to manipulate or alter the commands via user input or external untrusted data&lt;br /&gt;
**Determine if an attacker can inject arbitrary commands or manipulate the intended command in any way&lt;br /&gt;
*CSRF&lt;br /&gt;
*SQL Injection&lt;br /&gt;
*Cookies&lt;br /&gt;
*HTML5&lt;br /&gt;
&lt;br /&gt;
=== Networking ===&lt;br /&gt;
&lt;br /&gt;
*Are insecure protocols used to send or receive sensitive information? Examples- FTP, SNMP v1, SSH v1&lt;br /&gt;
&lt;br /&gt;
*Are there any known issues with the specific libraries you are using to implement the protocol?&lt;br /&gt;
&lt;br /&gt;
=== Transport Layer Protection ===&lt;br /&gt;
*Does the application properly implement Certificate Pinning?&lt;br /&gt;
&lt;br /&gt;
*Are certificates validated to determine if:&lt;br /&gt;
**The certificate has not expired&lt;br /&gt;
**The certificate was issued by a valid certificate authority&lt;br /&gt;
**The remote destination information matches the information within the certificate?&lt;br /&gt;
&lt;br /&gt;
*Are certificates validated only by the operating system or also by the application that relies on it?&lt;br /&gt;
&lt;br /&gt;
*Identify if code exist to alter the behavior for traffic transiting different interfaces (i.e.- 3G/4G comms vs. Wi-Fi)? If so, is encryption applied universally across each of them&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Helpful Search Strings and Regular Expressions ===&lt;br /&gt;
-To do&lt;br /&gt;
&lt;br /&gt;
== Dynamic Analysis ==&lt;br /&gt;
&lt;br /&gt;
Armed with data collected during the Information Gathering and Static Analysis phases, the tester can begin an informed vulnerability assessment of the mobile application client, server and associated services.&lt;br /&gt;
&lt;br /&gt;
Dynamic analysis is conducted against the backend services and APIs and the type of tests varies depending on mobile application type.&lt;br /&gt;
&lt;br /&gt;
=== Application Types ===&lt;br /&gt;
&lt;br /&gt;
*Native Mobile Application: Native mobile applications can be installed on to the device. This type of applications generally store most of their code on the device. Any information required can be requested to the server using the HTTP/s protocol&lt;br /&gt;
&lt;br /&gt;
*Web services for Mobile Application: Native mobile application that uses SOAP or REST based web services to communicate between client and Server&lt;br /&gt;
&lt;br /&gt;
*Mobile Browser Based Application: Web browser based applications can be accessed using device’s browsers such as Safari or Chrome. Most of the commercial applications are nowadays specifically designed and optimized for mobile browsers. These applications are no different than traditional web application and all the web application vulnerabilities apply to these apps and these should be tested as traditional web apps.&lt;br /&gt;
&lt;br /&gt;
*Mobile Hybrid Applications:Applications can leverage web browser functionality within native applications, blending the risks from both classes of applications.&lt;br /&gt;
&lt;br /&gt;
In this phase, the mobile client, backend services, and host platform is analyzed/scanned in attempt to uncover potential risks, vulnerabilities and threats. The use of an intercepting proxy tool as well as automated vulnerability scanners are core to this phase. In many cases, you will also need some type of shell access to the device.&lt;br /&gt;
&lt;br /&gt;
The following outline can be used as a “Dynamic Analysis” guide in planning a mobile assessment.&lt;br /&gt;
&lt;br /&gt;
=== Establishing a Baseline ===&lt;br /&gt;
&lt;br /&gt;
*Generate File System Baseline Fingerprint (before app installation)&lt;br /&gt;
**Application interactions with the host file system must be reviewed and analyzed at various stages of testing; starting with baseline capture. This may require a shell or GUI depending on platform and/or preference.&lt;br /&gt;
&lt;br /&gt;
*Install, Configure and Use the Application&lt;br /&gt;
**Manually inspect the file system to determine what files/databases were created, what and how data is stored. Did the application store sensitive data unencrypted or trivially protected (i.e. encoded)?&lt;br /&gt;
**Generally, pay attention to credentials, payment information, or other highly sensitive information being saved to the device. Also take a look at databases, log files, predictive text caches, and crash logs.&lt;br /&gt;
&lt;br /&gt;
=== Debugging ===&lt;br /&gt;
&lt;br /&gt;
*Attach a debugger to an application to step through code execution and setting breakpoints at interesting code within the application&lt;br /&gt;
&lt;br /&gt;
*Monitor logged messages and notifications generated at runtime&lt;br /&gt;
&lt;br /&gt;
*Observe interprocess communications between the target application and other applications and services running on the mobile device.&lt;br /&gt;
&lt;br /&gt;
=== Active Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Local Testing ====&lt;br /&gt;
&lt;br /&gt;
*Exposed IPC interfaces&lt;br /&gt;
**Sniff&lt;br /&gt;
**Fuzz&lt;br /&gt;
**Bypass authorization checks&lt;br /&gt;
&lt;br /&gt;
===== Cryptography =====&lt;br /&gt;
&lt;br /&gt;
*Brute force attacks against keys, pins, and hashes&lt;br /&gt;
*Attempt to reconstruct encrypted data through recovery of keys, hardcoded secrets, and any other information exposed by the application&lt;br /&gt;
&lt;br /&gt;
===== Web Applications =====&lt;br /&gt;
&lt;br /&gt;
*XSS and HTML Injection&lt;br /&gt;
**Is it possible to inject client side code (i.e. JavaScript) or HTML into the application to either modify the inner working of the application or it's user interface?&lt;br /&gt;
&lt;br /&gt;
*Command Injection (if the application utilizes a shell)&lt;br /&gt;
&lt;br /&gt;
*CSRF&lt;br /&gt;
&lt;br /&gt;
*SQL Injection&lt;br /&gt;
&lt;br /&gt;
*Cookies&lt;br /&gt;
**Are cookies issued by a server secured by using the HTTP-only and Secure flag?&lt;br /&gt;
**Is there any sensitive information stored in the cookies?&lt;br /&gt;
&lt;br /&gt;
*HTML5 Storage&lt;br /&gt;
&lt;br /&gt;
===== Authentication =====&lt;br /&gt;
&lt;br /&gt;
*Assess the methods an application uses to authenticate peers&lt;br /&gt;
**NFC&lt;br /&gt;
**SMS&lt;br /&gt;
**Push notifications&lt;br /&gt;
**Across IPC channels (identify the calling application’s privileges and identity)&lt;br /&gt;
&lt;br /&gt;
===== Authorization =====&lt;br /&gt;
*Instrument, patch, or interact with application at runtime to bypass methods intended to prevent usage of privileged or premium features&lt;br /&gt;
&lt;br /&gt;
*Determine if configuration or locally stored data can be manipulated in order to elevate a user’s privileges&lt;br /&gt;
&lt;br /&gt;
*Check the filesystem permissions for any files created at runtime&lt;br /&gt;
&lt;br /&gt;
===== File System Analysis =====&lt;br /&gt;
&lt;br /&gt;
*Assess the application’s behavior throughout it’s lifecycle to determine if special functionality is triggered to persist an application’s state when it enters different stages:&lt;br /&gt;
**Placed into the foreground&lt;br /&gt;
**Sent into the background&lt;br /&gt;
**Upon exiting the application&lt;br /&gt;
&lt;br /&gt;
*Data  storage in Cache&lt;br /&gt;
&lt;br /&gt;
*Looking for artifacts left on device&lt;br /&gt;
&lt;br /&gt;
*Unencrypted data storage on the device&lt;br /&gt;
&lt;br /&gt;
*Encryption of data in backups&lt;br /&gt;
&lt;br /&gt;
*Username/password, or app-specific unique device id stored on the device&lt;br /&gt;
&lt;br /&gt;
*Application Permissions , Privileges and Access controls on the device&lt;br /&gt;
&lt;br /&gt;
*Generally, pay attention to credentials, payment information, or other highly sensitive information being saved to the device. Also take a look at log files, predictive text caches, and crash logs.&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information cached within the application’s UI back stack?&lt;br /&gt;
&lt;br /&gt;
*Utilize forensic tools to determine if deleted data can be recovered from the filesystem as well as within databases&lt;br /&gt;
&lt;br /&gt;
===== Memory Analysis =====&lt;br /&gt;
&lt;br /&gt;
*Determine if sensitive information persists within memory after performing the following actions:&lt;br /&gt;
**Logging out of the application&lt;br /&gt;
**Transition between UI components&lt;br /&gt;
&lt;br /&gt;
*Is it possible to obtain encryption keys, credentials, payment information and other sensitive information by dumping device or application memory?&lt;br /&gt;
&lt;br /&gt;
==== Remote Application/Service Testing ====&lt;br /&gt;
&lt;br /&gt;
===== Authentication =====&lt;br /&gt;
&lt;br /&gt;
*What methods are available (3G, 4G, Wifi, etc)?&lt;br /&gt;
&lt;br /&gt;
*What happens if the remote authentication service becomes unavailable?&lt;br /&gt;
&lt;br /&gt;
*Assess strength of password requirements&lt;br /&gt;
&lt;br /&gt;
*Test how account lockouts are implemented&lt;br /&gt;
&lt;br /&gt;
*Analyze (monitor traffic) how each method performs authentication. Note target wifi as this is a common area where authentication can be weak. Ensure authentication is robust and not based on trivial attributes (i.e. MDN, ESN, etc).&lt;br /&gt;
&lt;br /&gt;
*Verify that authentication tokens are terminated after a user initiates a password reset&lt;br /&gt;
&lt;br /&gt;
*Single Sign On (SSO)&lt;br /&gt;
&lt;br /&gt;
*SMS Based&lt;br /&gt;
**One Time Passwords (OTP)&lt;br /&gt;
**Two Factor Authentication&lt;br /&gt;
&lt;br /&gt;
*Push Notifications&lt;br /&gt;
&lt;br /&gt;
*Licensing&lt;br /&gt;
&lt;br /&gt;
===== Authorization =====&lt;br /&gt;
&lt;br /&gt;
*What happens if the remote authorization handling service becomes unavailable?&lt;br /&gt;
&lt;br /&gt;
*Test if direct access to backend resources is possible&lt;br /&gt;
&lt;br /&gt;
*Access controls to server side resources not enforced&lt;br /&gt;
&lt;br /&gt;
*Vertical and horizontal privilege escalation&lt;br /&gt;
&lt;br /&gt;
===== Session Management =====&lt;br /&gt;
&lt;br /&gt;
*Entropy analysis&lt;br /&gt;
*Device identifier related?&lt;br /&gt;
*Are session tokens refreshed between logouts?&lt;br /&gt;
*Lifetime and expiration&lt;br /&gt;
*Handling the session token on the device (stored, in memory, etc.)&lt;br /&gt;
*Privilege Escalation&lt;br /&gt;
*Ineffective Session Termination&lt;br /&gt;
&lt;br /&gt;
===== Transport Layer Testing =====&lt;br /&gt;
*Man-in-the-middle attacks&lt;br /&gt;
*Eavesdropping&lt;br /&gt;
*SSL checks (cypher strengths/weakness etc.)&lt;br /&gt;
&lt;br /&gt;
===== Server Side Attacks =====&lt;br /&gt;
&lt;br /&gt;
*Triggering unhandled exceptions&lt;br /&gt;
*Cross-Site Scripting&lt;br /&gt;
*SQL Injection&lt;br /&gt;
*XML Bombs&lt;br /&gt;
*Buffer overflow&lt;br /&gt;
*Unrestricted File Upload&lt;br /&gt;
*Open Redirect&lt;br /&gt;
&lt;br /&gt;
===== Server, Network &amp;amp; Application Scanning =====&lt;br /&gt;
&lt;br /&gt;
*Based on prior phases you should have 1 or more target servers (i.e. URLs) as candidates for automated vulnerability scanning. Mobile applications often leverage existing web services/applications (i.e. hybrid applications) which must be tested for security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Conclusion =====&lt;br /&gt;
&lt;br /&gt;
Mobile applications are continuing to mature and evolve thus to be effective, security testers must strive to advance their knowledge and skills. Please check back periodically for updates and share your feedback with us.&lt;br /&gt;
&lt;br /&gt;
= Mobile Cheat Sheet  =&lt;br /&gt;
== Mobile Cheat Sheet Series  ==&lt;br /&gt;
&lt;br /&gt;
Cheat sheets provide the information most relevant to a developer or security engineer with minimal &amp;quot;fluff&amp;quot;. The goal of the project is to build a collection of cheat sheets that provide actionable, useful, and straight to the point guidance for a plethora of mobile security issues.&lt;br /&gt;
&lt;br /&gt;
== Platform Agnostic ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Dangers_of_Jailbreaking_and_Rooting_Mobile_Devices Dangers of Jailbreaking &amp;amp; Rooting Mobile Devices]&lt;br /&gt;
&lt;br /&gt;
== Android ==&lt;br /&gt;
&lt;br /&gt;
== iOS ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet iOS Developer Cheat Sheet]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet iOS Application Security Testing Cheat Sheet]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Windows Phone ==&lt;br /&gt;
&lt;br /&gt;
== RIM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Secure Mobile Development =&lt;br /&gt;
== Secure Mobile Development Guidelines Objective==&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Development Guidelines will provide developers with the knowledge they need to build secure mobile applications. An extendable framework will be provided that includes the core security flaws found across nearly all mobile platforms. It will be a living reference where contributors can plug in newly exposed APIs for various platforms and provide good/bad code examples along with remediation guidance for those issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Top 10 Mobile Controls =&lt;br /&gt;
==OWASP/ENISA Collaboration==&lt;br /&gt;
&lt;br /&gt;
OWASP and the European Network and Information Security Agency (ENISA) collaborated to build a joint set of controls. ENISA has published the results of the collaborative effort as the &amp;quot;Smartphone Secure Development Guideline&amp;quot;: http://www.enisa.europa.eu/activities/application-security/smartphone-security-1/smartphone-secure-development-guidelines&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Mobile_Top_10_Controls.jpg|center|800px]]&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
This document has been jointly produced with ENISA as well as the following individuals:&lt;br /&gt;
*Vinay Bansal, Cisco Systems&lt;br /&gt;
*Nader Henein, Research in Motion&lt;br /&gt;
*Giles Hogben, ENISA&lt;br /&gt;
*Karsten Nohl, Srlabs&lt;br /&gt;
*Jack Mannino, nVisium Security&lt;br /&gt;
*Christian Papathanasiou, Royal Bank of Scotland&lt;br /&gt;
*Stefan Rueping, Infineon&lt;br /&gt;
*Beau Woods, Stratigos Security&lt;br /&gt;
&lt;br /&gt;
== Top 10 mobile controls and design principles==&lt;br /&gt;
&lt;br /&gt;
'''[[#section control_1|1. Identify and protect sensitive data on the mobile device]]'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unsafe sensitive data storage, attacks on decommissioned phones unintentional disclosure: Mobile devices (being mobile) have a higher risk of loss or theft. Adequate protection should be built in to minimize the loss of sensitive data on the device.&lt;br /&gt;
&lt;br /&gt;
*1.1 In the design phase, classify data storage according to sensitivity and apply controls accordingly (e.g. passwords, personal data, location, error logs, etc.). Process, store and use data according to its classification. Validate the security of API calls applied to sensitive data.&lt;br /&gt;
*1.2 Store sensitive data on the server instead of the client-end device. This is based on the assumption that secure network connectivity is sufficiently available and that protection mechanisms available to server side storage are superior. The relative security of client vs server-side security also needs to be assessed on a case-by-case basis (see ENISA cloud risk assessment (3) or the OWASP Cloud top 10 (4) for decision support).&lt;br /&gt;
*1.3 When storing data on the device, use a file encryption API provided by the OS or other trusted source. Some platforms provide file encryption APIs which use a secret key protected by the device unlock code and deleteable on remote kill. If this is available, it should be used as it increases the security of the encryption without creating extra burden on the end-user. It also makes stored data safer in the case of loss or theft. However, it should be born in mind that even when protected by the device unlock key, if data is stored on the device, its security is dependent on the security of the device unlock code if remote deletion of the key is for any reason not possible.&lt;br /&gt;
*1.4 Do not store/cache sensitive data (including keys) unless they are encrypted and if possible stored in a tamper-proof area (see control 2).&lt;br /&gt;
*1.5 Consider restricting access to sensitive data based on contextual information such as location (e.g. wallet app not usable if GPS data shows phone is outside Europe, car key not usable unless within 100m of car etc...).&lt;br /&gt;
*1.6 Do not store historical GPS/tracking or other sensitive information on the device beyond the period required by the application (see controls 1.7, 1.8).&lt;br /&gt;
*1.7 Assume that shared storage is untrusted - information may easily leak in unexpected ways through any shared storage. In particular:&lt;br /&gt;
**Be aware of caches and temporary storage as a possible leakage channel, when shared with other apps.&lt;br /&gt;
**Be aware of public shared storage such as address book, media gallery and audio files as a possible leakage channel. For example storing images with location metadata in the media-gallery allows that information to be shared in unintended ways.&lt;br /&gt;
**Do not store temp/cached data in a world readable directory.&lt;br /&gt;
*1.8 For sensitive personal data, deletion should be scheduled according to a maximum retention period, (to prevent e.g. data remaining in caches indefinitely).&lt;br /&gt;
*1.9 There is currently no standard secure deletion procedure for flash memory (unless wiping the entire medium/card). Therefore data encryption and secure key management are especially important.&lt;br /&gt;
*1.10 Consider the security of the whole data lifecycle in writing your application (collection over the wire, temporary storage, caching, backup, deletion etc)&lt;br /&gt;
*1.11 Apply the principle of minimal disclosure - only collect and disclose data which is required for business use of the application. Identify in the design phase what data is needed, its sensitivity and whether it is appropriate to collect, store and use each data type.&lt;br /&gt;
*1.12 Use non-persistent identifiers which are not shared with other apps wherever possible - e.g. do not use the device ID number as an identifier unless there is a good reason to do so (use a randomly generated number – see 4.3). Apply the same data minimization principles to app sessions as to http sessions/cookies etc.&lt;br /&gt;
*1.13 Applications on managed devices should make use of remote wipe and kill switch APIs to remove sensitive information from the device in the event of theft or loss. (A kill-switch is the term used for an OS-level or purpose-built means of remotely removing applications and/or data).&lt;br /&gt;
*1.14 Application developers may want to incorporate an application-specific &amp;quot;data kill switch&amp;quot; into their products, to allow the per-app deletion of their application's sensitive data when needed (strong authentication is required to protect misuse of such a feature).&lt;br /&gt;
&lt;br /&gt;
'''2. Handle password credentials securely on the device'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Spyware, surveillance, financial malware. A user's credentials, if stolen, not only provide unauthorized access to the mobile backend service, they also potentially compromise many other services and accounts used by the user. The risk is increased by the widespread of reuse of passwords across different services.&lt;br /&gt;
&lt;br /&gt;
*2.1 Instead of passwords consider using longer term authorization tokens that can be securely stored on the device (as per the OAuth model). Encrypt the tokens in transit (using SSL/TLS). Tokens can be issued by the backend service after verifying&lt;br /&gt;
￼￼￼Smartphones secure development guidelines for app developers ￼the user credentials initially. The tokens should be time bounded to the specific service as well as revocable (if possible server side), thereby minimizing the damage in loss scenarios. Use the latest versions of the authorization standards (such as OAuth 2.0). Make sure that these tokens expire as frequently as practicable.&lt;br /&gt;
*2.2 In case passwords need to be stored on the device, leverage the encryption and key-store mechanisms provided by the mobile OS to securely store passwords, password equivalents and authorization tokens. Never store passwords in clear text. Do not store passwords or long term session IDs without appropriate hashing or encryption.&lt;br /&gt;
*2.3 Some devices and add-ons allow developers to use a Secure Element e.g. (5) (6) – sometimes via an SD card module - the number of devices offering this functionality is likely to increase. Developers should make use of such capabilities to store keys, credentials and other sensitive data. The use of such secure elements gives a higher level of assurance with the standard encrypted SD card certified at FIPS 140-2 Level 3. Using the SD cards as a second factor of authentication though possible, isn't recommended, however, as it becomes a pseudo-inseparable part of the device once inserted and secured.&lt;br /&gt;
*2.4 Provide the ability for the mobile user to change passwords on the device.&lt;br /&gt;
*2.5 Passwords and credentials should only be included as part of regular backups in encrypted or hashed form.&lt;br /&gt;
*2.6 Smartphones offer the possibility of using visual passwords which allow users to memorize passwords with higher entropy. These should only be used however, if sufficient entropy can be ensured. (7)&lt;br /&gt;
*2.7 Swipe-based visual passwords are vulnerable to smudge-attacks (using grease deposits on the touch screen to guess the password). Measures such as allowing repeated patterns should be introduced to foil smudge-attacks. (8)&lt;br /&gt;
*2.8 Check the entropy of all passwords, including visual ones (see 4.1 below).&lt;br /&gt;
*2.9 Ensure passwords and keys are not visible in cache or logs.&lt;br /&gt;
*2.10 Do not store any passwords or secrets in the application binary. Do not use a generic shared secret for integration with the backend (like password embedded in code). Mobile application binaries can be easily downloaded and reverse engineered.&lt;br /&gt;
&lt;br /&gt;
'''3. Ensure sensitive data is protected in transit'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Network spoofing attacks, surveillance. The majority of smartphones are capable of using multiple network mechanisms including Wi-Fi, provider network (3G, GSM, CDMA and others), Bluetooth etc. Sensitive data passing through insecure channels could be intercepted. (9) (10)&lt;br /&gt;
&lt;br /&gt;
*3.1 Assume that the provider network layer is not secure. Modern network layer attacks can decrypt provider network encryption, and there is no guarantee that the Wi-Fi network will be appropriately encrypted.&lt;br /&gt;
*3.2 Applications should enforce the use of an end-to-end secure channel (such as SSL/TLS) when sending sensitive information over the wire/air (e.g. using Strict Transport Security - STS (11)).This includes passing user credentials, or other authentication equivalents. This provides confidentiality and integrity protection.&lt;br /&gt;
*3.3 Use strong and well-known encryption algorithms (e.g. AES) and appropriate key lengths (check current recommendations for the algorithm you use e.g. (12) page 53).&lt;br /&gt;
*3.4 Use certificates signed by trusted CA providers. Be very cautious in allowing self- signed certificates. Do not disable or ignore SSL chain validation.&lt;br /&gt;
*3.5 For sensitive data, to reduce the risk of man-in-middle attacks (like SSL proxy, SSL strip), a secure connection should only be established after verifying the identity of the remote end-point (server). This can be achieved by ensuring that SSL is only established with end-points having the trusted certificates in the key chain.&lt;br /&gt;
*3.6 The user interface should make it as easy as possible for the user to find out if a certificate is valid.&lt;br /&gt;
*3.7 SMS, MMS or notifications should not be used to send sensitive data to or from mobile end-points.&lt;br /&gt;
&lt;br /&gt;
'''Reference:''' Google vulnerability of Client Login account credentials on unprotected wifi - [http://www.google.com/url?q=http%3A%2F%2Fwww.uni-ulm.de%2Fin%2Fmi%2Fmitarbeiter%2Fkoenings%2Fcatching-authtokens.html&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGO-Yp1KHqO8USuL0zxL1Lpwq1Usw]&lt;br /&gt;
&lt;br /&gt;
'''4. Implement user authentication,authorization and session management correctly'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unauthorized individuals may obtain access to sensitive data or systems by circumventing authentication systems (logins) or by reusing valid tokens or cookies. (13)&lt;br /&gt;
&lt;br /&gt;
*4.1 Require appropriate strength user authentication to the application. It may be useful to provide feedback on the strength of the password when it is being entered for the first time. The strength of the authentication mechanism used depends on the sensitivity of the data being processed by the application and its access to valuable resources (e.g. costing money).&lt;br /&gt;
*4.2 It is important to ensure that the session management is handled correctly after the initial authentication, using appropriate secure protocols. For example, require authentication credentials or tokens to be passed with any subsequent request (especially those granting privileged access or modification).&lt;br /&gt;
*4.3 Use unpredictable session identifiers with high entropy. Note that random number generators generally produce random but predictable output for a given seed (i.e. the same sequence of random numbers is produced for each seed). Therefore it is important to provide an unpredictable seed for the random number generator. The standard method of using the date and time is not secure. It can be improved, for example using a combination of the date and time, the phone temperature sensor and the current x,y and z magnetic fields. In using and combining these values, well-tested algorithms which maximise entropy should be chosen (e.g. repeated application of SHA1 may be used to combine random variables while maintaining maximum entropy – assuming a constant maximum seed length).&lt;br /&gt;
*4.4 Use context to add security to authentication - e.g. IP location, etc...&lt;br /&gt;
*4.5 Where possible, consider using additional authentication factors for applications giving access to sensitive data or interfaces where possible - e.g. voice, fingerprint (if available), who-you-know, behavioural etc.&lt;br /&gt;
*4.6 Use authentication that ties back to the end user identity (rather than the device identity).&lt;br /&gt;
&lt;br /&gt;
'''5. Keep the backend APIs (services) and the platform (server) secure''' &lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Attacks on backend systems and loss of data via cloud storage. The majority of mobile applications interact with the backend APIs using REST/Web Services or proprietary protocols. Insecure implementation of backend APIs or services, and not keeping the back-end platform hardened/patched will allow attackers to compromise data on the mobile device when transferred to the backend, or to attack the backend through the mobile application. (14)&lt;br /&gt;
&lt;br /&gt;
*5.1 Carry out a specific check of your code for sensitive data unintentionally transferred, any data transferred between the mobile device and web-server back- ends and other external interfaces - (e.g. is location or other information included within file metadata).&lt;br /&gt;
*5.2 All backend services (Web Services/REST) for mobile apps should be tested for vulnerabilities periodically, e.g. using static code analyser tools and fuzzing tools for testing and finding security flaws.&lt;br /&gt;
*5.3 Ensure that the backend platform (server) is running with a hardened configuration with the latest security patches applied to the OS, Web Server and other application components.&lt;br /&gt;
*5.4 Ensure adequate logs are retained on the backend in order to detect and respond to incidents and perform forensics (within the limits of data protection law).&lt;br /&gt;
*5.5 Employ rate limiting and throttling on a per-user/IP basis (if user identification is available) to reduce the risk from DDoS attack.&lt;br /&gt;
*5.6 Test for DoS vulnerabilities where the server may become overwhelmed by certain resource intensive application calls.&lt;br /&gt;
*5.7 Web Services, REST and APIs can have similar vulnerabilities to web applications:&lt;br /&gt;
**Perform abuse case testing, in addition to use case testing&lt;br /&gt;
**Perform testing of the backend Web Service, REST or API to determine vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''6. Secure data integration with third party services and applications'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Data leakage. Users may install applications that may be malicious and can transmit personal data (or other sensitive stored data) for malicious purposes.&lt;br /&gt;
&lt;br /&gt;
*6.1 Vet the security/authenticity of any third party code/libraries used in your mobile application (e.g. making sure they come from a reliable source, with maintenance supported, no backend Trojans)&lt;br /&gt;
*6.2 Track all third party frameworks/APIs used in the mobile application for security patches. A corresponding security update must be done for the mobile applications using these third party APIs/frameworks.&lt;br /&gt;
*6.3 Pay particular attention to validating all data received from and sent to non-trusted third party apps (e.g. ad network software) before processing within the application.&lt;br /&gt;
&lt;br /&gt;
'''7. Pay specific attention to the collection and storage of consent for the collection and use of the user’s data'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unintentional disclosure of personal or private information, illegal data processing. In the European Union, it is mandatory to obtain user consent for the collection of personally identifiable information (PII). (15) (16)&lt;br /&gt;
&lt;br /&gt;
*7.1 Create a privacy policy covering the usage of personal data and make it available to the user especially when making consent choices.&lt;br /&gt;
*7.2 Consent may be collected in three main ways:&lt;br /&gt;
**At install time&lt;br /&gt;
**At run-time when data is sent&lt;br /&gt;
**Via “opt-out” mechanisms where a default setting is implemented and the user has to turn it off.&lt;br /&gt;
*7.3 Check whether your application is collecting PII - it may not always be obvious - for example do you use persistent unique identifiers linked to central data stores containing personal information?&lt;br /&gt;
*7.4 Audit communication mechanisms to check for unintended leaks (e.g. image metadata).&lt;br /&gt;
*7.5 Keep a record of consent to the transfer of PII. This record should be available to the user (consider also the value of keeping server-side records attached to any user data stored). Such records themselves should minimise the amount of personal data they store (e.g. using hashing).&lt;br /&gt;
*7.6 Check whether your consent collection mechanism overlaps or conflicts (e.g. in the data handling practices stated) with any other consent collection within the same stack (e.g. APP-native + webkit HTML) and resolve any conflicts.&lt;br /&gt;
&lt;br /&gt;
'''8. Implement controls to prevent unauthorized access to paid-for resources (wallet, SMS, phone calls etc.)'''&lt;br /&gt;
'''Risks:''' Smartphone apps give programmatic (automatic) access to premium rate phone calls, SMS, roaming data, NFC payments, etc. Apps with privileged access to such API’s should take particular care to prevent abuse, considering the financial impact of vulnerabilities that giveattackers access to the user’s financial resources.&lt;br /&gt;
&lt;br /&gt;
*8.1 Maintain logs of access to paid-for resources in a non-repudiable format (e.g. a signed receipt sent to a trusted server backend – with user consent) and make them available to the end-user for monitoring. Logs should be protected from unauthorised access.&lt;br /&gt;
*8.2 Check for anomalous usage patterns in paid-for resource usage and trigger re- authentication. E.g. when significant change in location occurs, user-language changes etc.&lt;br /&gt;
*8.3 Consider using a white-list model by default for paid-for resource addressing - e.g. address book only unless specifically authorised for phone calls.&lt;br /&gt;
*8.4 Authenticate all API calls to paid-for resources (e.g. using an app developer certificate).&lt;br /&gt;
*8.5 Ensure that wallet API callbacks do not pass cleartext account/pricing/ billing/item information.&lt;br /&gt;
*8.6 Warn user and obtain consent for any cost implications for app behaviour.&lt;br /&gt;
*8.7 Implement best practices such as fast dormancy (a 3GPP specification), caching, etc. to minimize signalling load on base stations.&lt;br /&gt;
&lt;br /&gt;
'''9. Ensure secure distribution/provisioning of mobile applications'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Use of secure distribution practices is important in mitigating all risks described in the OWASP Mobile Top 10 Risks and ENISA top 10 risks.&lt;br /&gt;
*9.1 Applications must be designed and provisioned to allow updates for security patches, taking into account the requirements for approval by app-stores and the extra delay this may imply.&lt;br /&gt;
*9.2 Most app-stores monitor apps for insecure code and are able to remotely remove apps at short notice in case of an incident. Distributing apps through official app- stores therefore provides a safety-net in case of serious vulnerabilities in your app.&lt;br /&gt;
*9.3Provide feedback channels for users to report security problems with apps – e.g. a security@ email address.&lt;br /&gt;
&lt;br /&gt;
'''10. Carefully check any runtime interpretation of code for errors '''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Runtime interpretation of code may give an opportunity for untrusted parties to provide unverified input which is interpreted as code. For example, extra levels in a game, scripts, interpreted SMS headers. This gives an opportunity for malware to circumvent walled garden controls provided by app-stores. It can lead to injection attacks leading to Data leakage, surveillance, spyware, and diallerware.&lt;br /&gt;
&lt;br /&gt;
Note that it is not always obvious that your code contains an interpreter. Look for any capabilities accessible via user-input data and use of third party API’s which may interpret user-input - e.g. JavaScript interpreters.&lt;br /&gt;
&lt;br /&gt;
*10.1 Minimize runtime interpretation and capabilities offered to runtime interpreters: run interpreters at minimal privilege levels.&lt;br /&gt;
*10.2 Define comprehensive escape syntax as appropriate.&lt;br /&gt;
*10.3 Fuzz test interpreters.&lt;br /&gt;
*10.4 Sandbox interpreters.&lt;br /&gt;
&lt;br /&gt;
''Appendix A- Relevant General Coding Best Practices'''&lt;br /&gt;
&lt;br /&gt;
Some general coding best practices are particularly relevant to mobile coding. We have listed some of the most important tips here:&lt;br /&gt;
**Perform abuse case testing, in addition to use case testing.&lt;br /&gt;
**Validate all input.&lt;br /&gt;
**Minimise lines and complexity of code. A useful metric is cyclomatic complexity (17).&lt;br /&gt;
**Use safe languages (e.g. from buffer-overflow).&lt;br /&gt;
**Implement a security report handling point (address) security@example.com&lt;br /&gt;
**Use static and binary code analysers and fuzz-testers to find security flaws.&lt;br /&gt;
**Use safe string functions, avoid buffer and integer overflow.&lt;br /&gt;
**Run apps with the minimum privilege required for the application on the operating&lt;br /&gt;
system. Be aware of privileges granted by default by APIs and disable them.&lt;br /&gt;
**Don't authorize code/app to execute with root/system administrator privilege&lt;br /&gt;
**Always perform testing as a standard as well as a privileged user&lt;br /&gt;
**Avoid opening application-specific server sockets (listener ports) on the client device.&lt;br /&gt;
Use the communication mechanisms provided by the OS.&lt;br /&gt;
**Remove all test code before releasing the application&lt;br /&gt;
**Ensure logging is done appropriately but do not record excessive logs, especially those&lt;br /&gt;
including sensitive user information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Appendix B- Enterprise Guidelines''&lt;br /&gt;
**If a business-sensitive application needs to be provisioned on a device, applications should enforce of a higher security posture on the device (such as PIN, remote management/wipe, app monitoring)&lt;br /&gt;
**Device certificates can be used for stronger device authentication.'&lt;br /&gt;
&lt;br /&gt;
''References&amp;quot;&lt;br /&gt;
*1.ENISA. Top Ten Smartphone Risks . [Online] http://www.enisa.europa.eu/act/application-security/smartphone-security-1/top-ten-risks.&lt;br /&gt;
*2. OWASP. Top 10 mobile risks. [Online] https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks.&lt;br /&gt;
*3. Cloud Computing: Benefits, Risks and Recommendations for information security. [Online] 2009. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment.&lt;br /&gt;
*4. OWASP Cloud Top 10. [Online] https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project.&lt;br /&gt;
*5. Blackberry developers documents. [Online] http://www.blackberry.com/developers/docs/7.0.0api/net/rim/device/api/io/nfc/se/SecureElement.h tml,.&lt;br /&gt;
*6. Google Seek For Android. [Online] http://code.google.com/p/seek-for-android/.&lt;br /&gt;
*7. Visualizing Keyboard Pattern Passwords. [Online] cs.wheatoncollege.edu/~mgousie/comp401/amos.pdf.&lt;br /&gt;
*8. Smudge Attacks on Smartphone Touch Screens. Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. s.l. : Department of Computer and Information Science – University of Pennsylvania.&lt;br /&gt;
*9. Google vulnerability of Client Login account credentials on unprotected . [Online] http://www.uni- ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.html.&lt;br /&gt;
*10. SSLSNIFF. [Online] http://blog.thoughtcrime.org/sslsniff-anniversary-edition. 11. [Online] http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02.&lt;br /&gt;
￼￼￼￼Smartphones secure development guidelines for app developers&lt;br /&gt;
*11. [Online] http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02.&lt;br /&gt;
￼*12. NIST Computer Security. [Online] http://csrc.nist.gov/publications/nistpubs/800-57/sp800- 57_PART3_key-management_Dec2009.pdf.&lt;br /&gt;
*13. Google's ClientLogin implementation . [Online] http://www.uni- ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.html.&lt;br /&gt;
*14. [Online] https://www.owasp.org/index.php/Web_Services.&lt;br /&gt;
*15. EU Data Protection Directive 95/46/EC. [Online] http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;br /&gt;
*16. [Online] http://democrats.energycommerce.house.gov/sites/default/files/image_uploads/Testimony_05.04.11 _Spafford.pdf.&lt;br /&gt;
*17. [Online] http://www.aivosto.com/project/help/pm-complexity.html.&lt;br /&gt;
*18. [Online] http://code.google.com/apis/accounts/docs/AuthForInstalledApps.html.&lt;br /&gt;
**19. Google Wallet Security. [Online] http://www.google.com/wallet/how-it-works-security.htm.&lt;br /&gt;
&lt;br /&gt;
= OWASP Mobile Threat Model Project =&lt;br /&gt;
==Mobile Application Threat Model - Beta Release==&lt;br /&gt;
&lt;br /&gt;
This is the first release (February 2013) of the Mobile Application Threat Model developed by the initial project team (listed at the end of this release).  Development began mid-2011 and is being released in beta form for public comment and input.  It is by no means complete and some sections will need more contributions, details and also real world case studies.  It's the hope of the project team that others in the community can help contribute to this project to further enhance and improve this threat model.&lt;br /&gt;
&lt;br /&gt;
===Mobile Threat Model Introduction Statement===&lt;br /&gt;
Threat modeling is a systematic process that begins with a clear understanding of the system. It is necessary to define the following areas to understand possible threats to the application:&lt;br /&gt;
* '''Mobile Application Architecture''' - This area describes how the application is designed from device specific features used by the application, wireless transmission protocols, data transmission mediums, interaction with hardware components and other applications.&lt;br /&gt;
* '''Mobile Data''' - What data does the application store and process? What is the business purpose of this data and what are the data workflows?&lt;br /&gt;
* '''Threat Agent Identification''' - What are the threats to the mobile application and who are the threat agents.  This area also outlines the process for defining what threats apply to the mobile application.&lt;br /&gt;
* '''Methods of Attack''' - What are the most common attacks utilized by threat agents.  This area defines these attacks so that controls can be developed to mitigate attacks.&lt;br /&gt;
* '''Controls''' - What are the controls to prevent attacks.  This is the last area to be defined only after previous areas have been completed by the development team.&lt;br /&gt;
&lt;br /&gt;
===Target Audience for the Mobile Threat Model===&lt;br /&gt;
This model is to be used by mobile application developers and software architects as part of the “threat modeling” phase of a typical SDLC process.  The model can also be used by Information Security Professionals that need to determine what typical mobile application threats are and provide a methodology for conducting basic threat modeling.&lt;br /&gt;
&lt;br /&gt;
===How to Use the Mobile Threat Model===&lt;br /&gt;
This threat model is designed as an outline or checklist of items that need to be documented, reviewed and discussed when developing a mobile application.  Every organization that develops mobile applications will have different requirements as well as threats.  This model was designed to be as organizational and industry agnostic as possible so that any mobile application development team can use this as a guide for conducting threat modeling for their specific application. Real world case studies as examples will be integrated to this threat model in the near future.&lt;br /&gt;
&lt;br /&gt;
==Mobile Application Architecture==&lt;br /&gt;
&lt;br /&gt;
The mobile application architecture should, at the very least, describe device specific features used by the application, wireless transmission protocols, data transmission medium, interaction with hardware components and other applications. Applications can be mapped to this architecture as a preliminary attack surface assessment.&lt;br /&gt;
&lt;br /&gt;
===Architecture Considerations===&lt;br /&gt;
&lt;br /&gt;
Although mobile applications vary in function, they can be described using a generalized model as follows:&lt;br /&gt;
&lt;br /&gt;
Wireless interfaces&lt;br /&gt;
&lt;br /&gt;
Transmission Type&lt;br /&gt;
&lt;br /&gt;
Hardware Interaction&lt;br /&gt;
&lt;br /&gt;
Interaction with on device applications/services&lt;br /&gt;
&lt;br /&gt;
Interaction with off device applications/services&lt;br /&gt;
&lt;br /&gt;
Encryption Protocols&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc)&lt;br /&gt;
** Carrier&lt;br /&gt;
*** Data&lt;br /&gt;
*** SMS&lt;br /&gt;
*** Voice&lt;br /&gt;
** Endpoints&lt;br /&gt;
*** Web Services&lt;br /&gt;
**** RESTful or SOAP based&lt;br /&gt;
**** Third Party (Example: Amazon)&lt;br /&gt;
*** Websites&lt;br /&gt;
**** Does the app utilize or integrate the “mobile web” version of an existing web site?&lt;br /&gt;
*** App Stores&lt;br /&gt;
**** Google Play&lt;br /&gt;
**** Apple App Store&lt;br /&gt;
**** Windows Mobile&lt;br /&gt;
**** BlackBerry App Store&lt;br /&gt;
*** Cloud Storage&lt;br /&gt;
**** Amazon/Azure&lt;br /&gt;
*** Corporate Networks (via VPN, ssh, etc.)&lt;br /&gt;
** Wireless interfaces&lt;br /&gt;
*** 802.11&lt;br /&gt;
*** NFC&lt;br /&gt;
*** Bluetooth&lt;br /&gt;
*** RFID&lt;br /&gt;
** Device&lt;br /&gt;
*** App Layer&lt;br /&gt;
*** Runtime Environment (VM, framework dependencies, etc)&lt;br /&gt;
*** OS Platform&lt;br /&gt;
** Apple iOS&lt;br /&gt;
** Android&lt;br /&gt;
** Windows Mobile&lt;br /&gt;
** BlackBerry&lt;br /&gt;
*** Baseband&lt;br /&gt;
* Common hardware components&lt;br /&gt;
** GPS&lt;br /&gt;
** Sensors (accelerometer)&lt;br /&gt;
** Cellular Radios (GSM/CDMA/LTE)&lt;br /&gt;
** Flash Memory&lt;br /&gt;
** Removable Storage (i.e.- SD)&lt;br /&gt;
** USB ports&lt;br /&gt;
** Wireless Interfaces&lt;br /&gt;
*** 802.11&lt;br /&gt;
*** Bluetooth&lt;br /&gt;
*** NFC&lt;br /&gt;
*** RFID&lt;br /&gt;
** Touch Screen&lt;br /&gt;
** Hardware Keyboard&lt;br /&gt;
** Microphone&lt;br /&gt;
** Camera&lt;br /&gt;
* Authentication&lt;br /&gt;
** Method&lt;br /&gt;
*** Knowledge based&lt;br /&gt;
*** Token based&lt;br /&gt;
*** Biometrics&lt;br /&gt;
** Input Type&lt;br /&gt;
*** Keyboard&lt;br /&gt;
*** Touch screen&lt;br /&gt;
*** Hardware peripheral&lt;br /&gt;
** Decision Process&lt;br /&gt;
*** Local (on device)&lt;br /&gt;
*** Remote (off device)&lt;br /&gt;
* Define app architecture relative to OS stack + security model&lt;br /&gt;
** What should or shouldn't the app do?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mobile Data==&lt;br /&gt;
This section defines what purpose does the app serve from a business perspective and what data the app store, transmit and receive.  It’s also important to review data flow diagrams to determine exactly how data is handled and managed by the application.&lt;br /&gt;
&lt;br /&gt;
* What is the business function of the app?&lt;br /&gt;
* What data does the application store/process (provide data flow diagram)&lt;br /&gt;
** This diagram should outline network, device file system and application data flows&lt;br /&gt;
** How is data transmitted between third party API’s and app(s)&lt;br /&gt;
** Are there different data handling requirements between different mobile platforms? (iOS/Android/Blackberry/Windows/J2ME) &lt;br /&gt;
** Does the app use cloud storage APIs (Dropbox, Google Drive, iCloud, Lookout) for device data backups&lt;br /&gt;
** Does personal data intermingle with corporate data?&lt;br /&gt;
** Is there specific business logic built into the app to process data?&lt;br /&gt;
* What does the data give you (or an attacker) access to&lt;br /&gt;
** Data at Rest&lt;br /&gt;
** Example: Do stored credentials provide authentication?&lt;br /&gt;
** Data in Transit&lt;br /&gt;
** Example: Do stored keys allow you to break crypto functions (data integrity)?&lt;br /&gt;
* Third party data, is it being stored/transmitted?&lt;br /&gt;
** What is the privacy requirements of user data&lt;br /&gt;
** Example: UDID or Geolocation on iOS transmitted to 3rd party&lt;br /&gt;
** Are there regulatory requirements to meet specific to user privacy?&lt;br /&gt;
* How does other data on the device affect the app (sandboxing restrictions enforced?)&lt;br /&gt;
** Example: Authentication credentials shared between apps&lt;br /&gt;
* What is the impact of Jailbroken/Rooted vs Non Jailbroken/Rooted device and how this affects app data (can also relate to threat agent identification)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Threat Agent Identification==&lt;br /&gt;
What are the threats to the mobile application and who are the threat agents.  This area also outlines the process for defining what threats apply to the mobile application.&lt;br /&gt;
&lt;br /&gt;
===Identifying Threat Agents===&lt;br /&gt;
&lt;br /&gt;
The process of identifying a threat agent is very simple and have been mentioned in the below steps:&lt;br /&gt;
&lt;br /&gt;
'''S1''': Take the list of all sensitive data (or information to protect) listed down from Section 2 – Mobile Data&lt;br /&gt;
&lt;br /&gt;
'''S2:''' Make a list of all the ways to access this data&lt;br /&gt;
&lt;br /&gt;
'''S3:''' The medium used to access the same listed in S3 is the Threat Agent to be identified&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Threat Agent Identification Example===&lt;br /&gt;
&lt;br /&gt;
Let us understand it in a better way using an example of a Financial Application (specifically a Banking Application). Following the process as mentioned above:&lt;br /&gt;
&lt;br /&gt;
'''S1:''' Sensitive data present in the application has been listed as: Beneficiary Details stored in some form in the Phone Application Memory and User Credentials used for authentication transmitted to the server.&lt;br /&gt;
'''S2:''' List the various ways of accessing information:&lt;br /&gt;
&lt;br /&gt;
# Beneficiary Details:&lt;br /&gt;
## A device user aiming to browse through the memory card / phone memory&lt;br /&gt;
## An adversary using a jail broken phone; starts reading the content through putty/WinSCP via SSH&lt;br /&gt;
## An adversary while sniffing the WiFi, traffic sniffs the content travelling through the network&lt;br /&gt;
## Another malicious application while reading the phone memory contents, stumbles upon this data as the device is Jailbroken&lt;br /&gt;
## Another application which is sending data through SMS sends this data.&lt;br /&gt;
## A Web Application executing a script on the browser tries to get steal the phone memory and send it to its server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''S3:''' From the above points, we list down the medium used:&lt;br /&gt;
&lt;br /&gt;
# Any user who has the device (Stolen device/ friend / etc)&lt;br /&gt;
## Any malicious application (installed / Web based script)&lt;br /&gt;
## An adversary sniffing the Wifi.&lt;br /&gt;
## etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
From the above example you should have a clear picture on how to identify Threat Agents. Below is list of threat agents, which were identified while analyzing various commonly used applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Listing of Threat Agents - By Category===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Human Interaction====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Stolen Device User:''' A user who obtained unauthorized access to the device aiming to get hold of the memory related sensitive information belonging to the owner of the device.&lt;br /&gt;
&lt;br /&gt;
* '''Owner of the Device:''' A user who unwillingly has installed a malicious application on his phone which gains access to the device application memory.&lt;br /&gt;
&lt;br /&gt;
* '''Common WiFi Network User­:''' This agent is aimed at any adversary intentionally or unintentionally sniffing the WiFi network used by a victim. This agent stumbles upon all the data transmitted by the victim device and may re-use it to launch further attacks.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious Developer:''' A human user who has the intent of writing an application which not only provides a commonly known function like gaming / calculator / utility in the foreground but steal as much information from your device as possible in real-time and transmits it to the malicious user. This agent can also be looked at an angle from which he codes an app to perform DOS by using up all the device resources.&lt;br /&gt;
&lt;br /&gt;
* '''Organization Internal Employees:''' Any user who is part of the organization (may be a programmer / admin / user / etc). Anyone who has privileges to perform an action on the application.&lt;br /&gt;
&lt;br /&gt;
* '''App Store Approvers/Reviewers:''' Any app store which fails to review potentially dangerous code or malicious application which executes on a user’s device and performs suspicious/ malicious activities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Automated Programs====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Malware on the device''': Any program / mobile application which performs suspicious activity. It can be an application, which is copying real time data from the user’s device and transmitting it to any server. This type of program executes parallel to all the processes running in the background and stays alive performing malicious activity all the time. E.g. Olympics App which stole text messages and browsing history:[http://venturebeat.com/2012/08/06/olympics-android-app/  ][http://venturebeat.com/2012/08/06/olympics-android-app/ http://venturebeat.com/2012/08/06/olympics-android-app/]&lt;br /&gt;
&lt;br /&gt;
* '''Scripts executing at the browser with HTML5''': Any script code written in a language similar to JavaScript having capability of accessing the device level content falls under this type of agent section. A script executing at the browser reading and transmitting browser memory data / complete device level data.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious SMS''': An incoming SMS redirected to trigger any kind of suspicious activity on the mobile device. There are multiple services which keep running in the background. Each of these services have listeners which might be active to listen for the content of an incoming SMS. An SMS message may be a sort of trigger for the service to perform some suspicious activity.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious App:''' Failure to detect malicious or vulnerable code and the likelihood of a compromise or attack against the app store itself, potentially turning legitimate code into hostile things including updates and new downloaded apps.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is a diagram illustrated to understand the Threat Agents and Threats in a visual manner:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[image:Mobile-app-threat-agents.png|582x527px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Figure 1 : Pictorial Representation of Threats and Agents'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Methods of Attack==&lt;br /&gt;
In this section, we will observe different methods an attacker can use to reach the data. This data can be sensitive information to the device or something sensitive to the app itself.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack’s Flowchart===&lt;br /&gt;
&lt;br /&gt;
Destruction of the asset is normally classified as attack. Attack can be further categorized as a planned attack or an unplanned one. Unintended attacks are normally caused due to some form of accidental actions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[image:Mobile-app-attack-workflow.png]]&lt;br /&gt;
&lt;br /&gt;
'''Figure 2: Attack Workflow'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack Scenario===&lt;br /&gt;
&lt;br /&gt;
'''“Method aimed to read the local application memory”'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The above mentioned attack methodology is the one in which the data which is targeted is application specific memory and the method used is memory based analysis. The attacker steals any sensitive data like passwords, userid, user account information which is stored in the application memory by reading the device memory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We have listed down other methods below which can be mapped with the second section in a similar fashion:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The classification of attacks based on the way data is handled:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Carrier Based Methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Man in the middle (MiTM) attacks which can steal data packets including SMS or voice packets&lt;br /&gt;
# Hijack wireless transmission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Endpoints based methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Inject code to tamper with web application or web services&lt;br /&gt;
# Many of the OWASP Mobile Top 10/OWASP Web Application Top 10&lt;br /&gt;
# Publishing Malwares in the app store&lt;br /&gt;
# Stealing user sensitive phone contents using Malwares&lt;br /&gt;
# Cloud storage&lt;br /&gt;
# Targeting malicious corporate network. (e.g. VPN Keys, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wireless interfaces based methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Stealing data when its in-transit using wireless channel like 802.11, NFC based data exchange or Bluetooth based data exchange. Application Level Attacks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* OS and application level methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Exploit the Input validation on client-side by by-passing the checks&lt;br /&gt;
# An adversary steals sensitive data by reading SD Card based stored content&lt;br /&gt;
# Exploiting vulnerabilities within an app or runtime environment. (VM, framework dependencies, etc)&lt;br /&gt;
# An adversary exploits OS level functionalities steal data from device or server&lt;br /&gt;
# Rooting or Jailbreaking the phone to access sensitive data from memory&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Miscellaneous Methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Method used to exploit and steal GPS based signals which falls in users personal information&lt;br /&gt;
# Method used to exploit the flash memory&lt;br /&gt;
# Method used to perform “tap jacking” based attacks.&lt;br /&gt;
# Method used to steal keyboard cache or logs.&lt;br /&gt;
# Method used to steal microphone recordings of a user&lt;br /&gt;
# Method used to exploit and misuse the camera functionality.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Controls==&lt;br /&gt;
What are the controls to prevent attacks.  This is the last area to be defined only after previous areas have been completed by the development team.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* What are the controls to prevent an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to detect an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to mitigate/minimize impact of an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to protect users private information (privacy controls)&lt;br /&gt;
** Example: prompts for access to address book/geolocation&lt;br /&gt;
* Create a mapping of controls to each specific method of attack (defined in Section 4 – Methods of Attack)&lt;br /&gt;
** Create level of assurance framework based on controls implemented. This would be subjective to a certain point, but it would be useful in guiding organizations who want to achieve a certain level of risk management based on the threats and vulnerabilities&lt;br /&gt;
* Case studies, control examples&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
Special thanks to the following team members who contributed to the initial release of the threat model:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tom Eston (Project Lead)&lt;br /&gt;
&lt;br /&gt;
Jack Mannino&lt;br /&gt;
&lt;br /&gt;
Sreenarayan Ashokkumar&lt;br /&gt;
&lt;br /&gt;
Swapnil Deshmukh&lt;br /&gt;
&lt;br /&gt;
Brandon Knight&lt;br /&gt;
&lt;br /&gt;
Steve Jensen&lt;br /&gt;
&lt;br /&gt;
Shimon Modi&lt;br /&gt;
&lt;br /&gt;
Rodrigo Marcos&lt;br /&gt;
&lt;br /&gt;
Brandon Clark&lt;br /&gt;
&lt;br /&gt;
Yvesmarie Quemener&lt;br /&gt;
&lt;br /&gt;
Yashraj Paralikar&lt;br /&gt;
&lt;br /&gt;
Ritesh Taank&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=168929</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=168929"/>
				<updated>2014-02-25T01:00:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ==&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
*** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DVIA&amp;diff=167278</id>
		<title>OWASP DVIA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DVIA&amp;diff=167278"/>
				<updated>2014-02-04T02:06:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Welcome to the Damn Vulnerable iOS Application home page.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
Current Challenge Categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|DVIA Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DVIA&amp;diff=167277</id>
		<title>OWASP DVIA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DVIA&amp;diff=167277"/>
				<updated>2014-02-04T02:02:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Welcome to the Damn Vulnerable iOS Application home page.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
Current Challenge Categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP DVIA Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|DVIA Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DVIA&amp;diff=167276</id>
		<title>OWASP DVIA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DVIA&amp;diff=167276"/>
				<updated>2014-02-04T02:02:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: Created page with &amp;quot;=  Main  =  &amp;lt;b&amp;gt;Welcome to the Damn Vulnerable iOS Application home page.&amp;lt;/b&amp;gt;  Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile t...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Welcome to the Damn Vulnerable iOS Application home page.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
Current Challenge Categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|DVIA Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Mobile_Tools&amp;diff=167275</id>
		<title>Projects/OWASP Mobile Security Project - Mobile Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Mobile_Tools&amp;diff=167275"/>
				<updated>2014-02-04T02:00:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== iMAS  ==&lt;br /&gt;
&lt;br /&gt;
iMAS is a collaborative research project from the MITRE Corporation focused on open source iOS security controls. Today, iOS meets the enterprise security needs of customers, however many security experts cite critical vulnerabilities and have demonstrated exploits, which pushes enterprises to augment iOS deployments with commercial solutions. The iMAS intent is to protect iOS applications and data beyond the Apple provided security model and reduce the adversary’s ability and efficiency to perform recon, exploitation, control and execution on iOS mobile applications. iMAS will transform the effectiveness of the existing iOS security model across major vulnerability areas including the System Passcode, jailbreak, debugger / run-time, flash storage, and the system keychain. Research outcomes include an open source secure application framework, including an application container, developer and validation tools/techniques.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project iMas Project Page]&lt;br /&gt;
&lt;br /&gt;
The source code for iMAS is available on GitHub: [https://github.com/project-imas/about iMAS Source Code]&lt;br /&gt;
&lt;br /&gt;
== GoatDroid  ==&lt;br /&gt;
&lt;br /&gt;
OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. GoatDroid requires minimal dependencies and is ideal for both Android beginners as well as more advanced users. The project currently includes two applications: FourGoats, a location-based social network, and Herd Financial, a mobile banking application. There are also several features that greatly simplify usage within a training environment or for absolute beginners who want a good introduction to working with the Android platform.&lt;br /&gt;
&lt;br /&gt;
As the Android SDK introduces new features, the GoatDroid contributors will strive to implement up-to-date lessons that can educate developers and security testers on new security issues. The project currently provides coverage for most of the OWASP Top 10 Mobile Risks and also includes a bunch of other problems as well.&lt;br /&gt;
&lt;br /&gt;
You can find GoatDroid on GitHub: [https://github.com/jackMannino/OWASP-GoatDroid-Project GoatDroid Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project GoatDroid Project Page]&lt;br /&gt;
&lt;br /&gt;
== iGoat ==&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
# Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iGoat_Project iGoat Project Page]&lt;br /&gt;
&lt;br /&gt;
The iGoat source code is available on Google Code [http://code.google.com/p/owasp-igoat/ iGoat Source Code]&lt;br /&gt;
&lt;br /&gt;
== Damn Vulnerable iOS Application ==&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
The current challenge categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_DVIA DVIA OWASP Project Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/prateek147/DVIA DVIA Github Source]&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com/#learn DVIA Learning Resources]&lt;br /&gt;
&lt;br /&gt;
== MobiSec ==&lt;br /&gt;
&lt;br /&gt;
The MobiSec Live Environment Mobile Testing Framework project is a live environment for testing mobile environments, including devices, applications, and supporting infrastructure. The purpose is to provide attackers and defenders the ability to test their mobile environments to identify design weaknesses and vulnerabilities. The MobiSec Live Environment provides a single environment for testers to leverage the best of all available open source mobile testing tools, as well as the ability to install additional tools and platforms, that will aid the penetration tester through the testing process as the environment is structured and organized based on an industry­‐proven testing framework. Using a live environment provides penetration testers the ability to boot the MobiSec Live Environment on any Intel-­based system from a DVD or USB flash drive, or run the test environment within a virtual machine. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_MobiSec Project Page]&lt;br /&gt;
&lt;br /&gt;
MobiSec can be downloaded from Sourceforge: [http://sourceforge.net/p/mobisec/wiki/Home/ MobiSec Download Repository]&lt;br /&gt;
&lt;br /&gt;
== Androick  ==&lt;br /&gt;
&lt;br /&gt;
Androick is a collaborative research project from PHONESEC Ltd. With our tool, you can evaluate some risks on Android mobile applications.&lt;br /&gt;
Androick is a tool that allows any user to analyze an Android application. It can get the apk file, all the datas and the databases in sqlite3 and csv format. &lt;br /&gt;
Only for Pentesters or Researchers.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Androick_Project Androick Project Page]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166948</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166948"/>
				<updated>2014-01-30T06:48:26Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ==&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
*** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166947</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166947"/>
				<updated>2014-01-30T06:47:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ==&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
*** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166946</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166946"/>
				<updated>2014-01-30T06:42:15Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
=== About this list  ===&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ===&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Additional Information ===&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
*** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166945</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166945"/>
				<updated>2014-01-30T06:40:56Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
=== About this list  ===&lt;br /&gt;
&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ===&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Additional Information ===&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
*** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
*** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166943</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166943"/>
				<updated>2014-01-30T06:34:24Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
=== About this list  ===&lt;br /&gt;
&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ===&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Project Leads &amp;amp; Contributors ===&lt;br /&gt;
&lt;br /&gt;
*[[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Archive ===&lt;br /&gt;
&lt;br /&gt;
The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*[[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Project Methodology ===&lt;br /&gt;
&lt;br /&gt;
We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology].&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166942</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=166942"/>
				<updated>2014-01-30T06:31:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
&lt;br /&gt;
In 2013 we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our road-map for 2014 includes:&lt;br /&gt;
&lt;br /&gt;
* More updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc.&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This list is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Re-Release Candidate 2014 v1.0 ==&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads &amp;amp; Contributors ==&lt;br /&gt;
&lt;br /&gt;
*[[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
&lt;br /&gt;
The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
*[[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology].&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M9&amp;diff=166730</id>
		<title>Mobile Top 10 2014-M9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M9&amp;diff=166730"/>
				<updated>2014-01-27T09:57:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;{{Top_10_2010:SubsectionColoredTemplate|Improper Session Handling||year=2014}}&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Anyone with access to HTTP/S traffic, cookie data, etc.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack vectors include physical access to the device and network traffic capture&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Malicious or accidental session hijacking&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Unauthorized users gaining access to other users' accounts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Customers losing control of their accounts and/or data&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable To Improper Session Handling?||year=2014}}&lt;br /&gt;
The M9 category deals with session handling and the various ways it can be done insecurely.&lt;br /&gt;
 &lt;br /&gt;
Improper Session Handling should be considered extremely similar to poor authentication. This is because once you are authenticated and given a session, that session allows one access to the application in question. In short, you must protect your sessions just as carefully as you protect your authentication mechanism.&lt;br /&gt;
&lt;br /&gt;
Here are some examples of how it is often done improperly:&lt;br /&gt;
&lt;br /&gt;
==Failure to Invalidate Sessions on the Backend==&lt;br /&gt;
&lt;br /&gt;
Many developers invalidate sessions on the client side and not on the server side, leaving a major window of opportunity for attackers who are using HTTP manipulation tools. Ensure that all session invalidation events are executed on the server side and not just on the client.&lt;br /&gt;
&lt;br /&gt;
==Lack of Adequate Timeout Protection==&lt;br /&gt;
&lt;br /&gt;
Any mobile application you create must have adequate timeout protection on the backend components. This helps prevent both malicious and accidental potential for an unauthorized user to gain access to an existing session and assume the role of an authorized user.&lt;br /&gt;
&lt;br /&gt;
Good timeout periods vary widely according to the sensitivity of the app, one's own risk profile, etc., but some good guidelines are:&lt;br /&gt;
&lt;br /&gt;
* 15 minutes for high security applications&lt;br /&gt;
* 30 minutes for medium security applications&lt;br /&gt;
* 1 hour for low security applications&lt;br /&gt;
&lt;br /&gt;
==Failure to Properly Rotate Cookies==&lt;br /&gt;
&lt;br /&gt;
Another major problem with session management implementations is the failure to properly reset cookies during authentication state changes. Authentication state changes include events like:&lt;br /&gt;
&lt;br /&gt;
* Switching from an anonymous user to a logged in user&lt;br /&gt;
* Switching from any logged in user to another logged in user&lt;br /&gt;
* Switching from a regular user to a privileged user&lt;br /&gt;
* Timeouts&lt;br /&gt;
&lt;br /&gt;
For each of these event types, it is critical that sessions are destroyed on the server side and that the cookies presented as part of the previous sessions are no longer accepted. Ideally, your application would even detect any use of said cookies and would report that to the appropriate security team.&lt;br /&gt;
&lt;br /&gt;
==Insecure Token Creation==&lt;br /&gt;
&lt;br /&gt;
In addition to properly invalidating tokens (on the server side) during key application events, it's also crucial that the tokens themselves are generated properly. Just as with encryption algorithms, developers should use well-established and industry-standard methods of created tokens. They should be sufficiently long, complex, and pseudo-random so as to be resistant to guessing/anticipation attacks.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Improper Session Handling?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=2}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M9&amp;diff=166729</id>
		<title>Mobile Top 10 2014-M9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M9&amp;diff=166729"/>
				<updated>2014-01-27T09:55:48Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;{{Top_10_2010:SubsectionColoredTemplate|Improper Session Handling||year=2014}}&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Anyone with access to HTTP/S traffic, cookie data, etc.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack vectors include physical access to the device and network traffic capture&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Malicious or accidental session hijacking&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Unauthorized users gaining access to other users' accounts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Customers losing control of their accounts and/or data&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable To Improper Session Handling?||year=2014}}&lt;br /&gt;
The M9 category deals with session handling and the various ways it can be done insecurely.&lt;br /&gt;
 &lt;br /&gt;
Improper Session Handling should be considered extremely similar to poor authentication. This is because once you are authenticated and given a session, that session allows one access to the application in question. In short, you must protect your sessions just as carefully as you protect your authentication mechanism.&lt;br /&gt;
&lt;br /&gt;
Here are some examples of how it is often done improperly:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Failure to Invalidate Sessions on the Backend&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Lack of Adequate Timeout Protection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Failure to Properly Rotate Cookies&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insecure Token Creation&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Failure to Invalidate Sessions on the Backend==&lt;br /&gt;
&lt;br /&gt;
Many developers invalidate sessions on the client side and not on the server side, leaving a major window of opportunity for attackers who are using HTTP manipulation tools. Ensure that all session invalidation events are executed on the server side and not just on the client.&lt;br /&gt;
&lt;br /&gt;
==Lack of Adequate Timeout Protection==&lt;br /&gt;
&lt;br /&gt;
Any mobile application you create must have adequate timeout protection on the backend components. This helps prevent both malicious and accidental potential for an unauthorized user to gain access to an existing session and assume the role of an authorized user.&lt;br /&gt;
&lt;br /&gt;
Good timeout periods vary widely according to the sensitivity of the app, one's own risk profile, etc., but some good guidelines are:&lt;br /&gt;
&lt;br /&gt;
* 15 minutes for high security applications&lt;br /&gt;
* 30 minutes for medium security applications&lt;br /&gt;
* 1 hour for low security applications&lt;br /&gt;
&lt;br /&gt;
==Failure to Properly Rotate Cookies==&lt;br /&gt;
&lt;br /&gt;
Another major problem with session management implementations is the failure to properly reset cookies during authentication state changes. Authentication state changes include events like:&lt;br /&gt;
&lt;br /&gt;
* Switching from an anonymous user to a logged in user&lt;br /&gt;
* Switching from any logged in user to another logged in user&lt;br /&gt;
* Switching from a regular user to a privileged user&lt;br /&gt;
* Timeouts&lt;br /&gt;
&lt;br /&gt;
For each of these event types, it is critical that sessions are destroyed on the server side and that the cookies presented as part of the previous sessions are no longer accepted. Ideally, your application would even detect any use of said cookies and would report that to the appropriate security team.&lt;br /&gt;
&lt;br /&gt;
==Insecure Token Creation==&lt;br /&gt;
&lt;br /&gt;
In addition to properly invalidating tokens (on the server side) during key application events, it's also crucial that the tokens themselves are generated properly. Just as with encryption algorithms, developers should use well-established and industry-standard methods of created tokens. They should be sufficiently long, complex, and pseudo-random so as to be resistant to guessing/anticipation attacks.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Improper Session Handling?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=2}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M1&amp;diff=166725</id>
		<title>Mobile Top 10 2014-M1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M1&amp;diff=166725"/>
				<updated>2014-01-27T08:51:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Weak Server Side Controls&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|AVERAGE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Consider anything that can send untrusted data to the web server, including both the application and users. Additionally do not discount users directly calling the web-site/API/web-service. &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;The attack vectors for the conglomeration that is Weak Server Side Controls include several easy to exploit vulnerabilities (like server side injection) that are high risk.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Security Weakness Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Technical Impacts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Business Impacts &amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=1|risk=2}}&lt;br /&gt;
The M1 category is one that is always in heavy debate. It encompasses almost everything that a mobile application can do badly that does not take place on the phone. Which is exactly the argument… should it be listed at all? Don’t we have Top Ten lists for Web Applications? Don’t we have one for cloud too?&lt;br /&gt;
 &lt;br /&gt;
In fact, we do. If we could be altogether sure that everyone who wanted information on mobile security also stopped by those projects… it would be a perfect world. Unfortunately, after two rounds of data collection from some of the world’s top assessment teams, we find that server side issues are so prevalent in mobile applications that we cannot ignore them in the Risk listing. While not statistically validated we feel that several factors lead to bad mobile application server code (and on a larger scale mobile insecurity in general):&lt;br /&gt;
 &lt;br /&gt;
* Rush to market&lt;br /&gt;
* Lack of security knowledge because of the new-ness of the languages&lt;br /&gt;
* Easy access to frameworks that don’t prioritize security&lt;br /&gt;
* Higher than average outsourced development&lt;br /&gt;
* Lower security budgets for mobile applications&lt;br /&gt;
* Assumption that the mobile OS takes full responsibility for security&lt;br /&gt;
* Weakness due to cross-platform development and compilation&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=2|risk=2}}&lt;br /&gt;
Secure coding and configuration practices must be used on server-side of the mobile application. For specific vulnerability information refer to the OWASP Web Top Ten or Cloud Top Ten projects. We will try and link references to those projects and other OWASP projects that provide more robust descriptions.&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you look below, you can see that there is a ton of surface area to cover when thinking about M1:&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CloudTT_thum.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project]]     [[File:WebTT_thumb.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project]]&amp;lt;/center&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
=== The Worst Offenders ===&lt;br /&gt;
&lt;br /&gt;
While we cannot go over all of these, what we can do is list vulnerability types that we see most often within mobile applications:&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Poor Web Services Hardening&lt;br /&gt;
: Logic flaws&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_business_logic_(OWASP-BL-001) Testing for business logic flaws]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Business_Logic_Security_Cheat_Sheet Business Logic Security Cheat Sheet]&lt;br /&gt;
: Weak Authentication&lt;br /&gt;
:: [https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management OWASP Top Ten Broken Authentication Section]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Guide_to_Authentication Developers Guide for Authentication]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_authentication Testing for Authentication]&lt;br /&gt;
: Weak or no session management&lt;br /&gt;
: Session fixation&lt;br /&gt;
: Sensitive data transmitted using GET method&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Insecure web server configurations&lt;br /&gt;
: Default content&lt;br /&gt;
: Administrative interfaces&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Injection (SQL, XSS, Command) on both web services and mobile-enabled websites&lt;br /&gt;
&lt;br /&gt;
; Authentication flaws&lt;br /&gt;
&lt;br /&gt;
; Session Management flaws&lt;br /&gt;
&lt;br /&gt;
; Access control vulnerabilities&lt;br /&gt;
&lt;br /&gt;
; Local and Remote File Includes&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=2}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M10&amp;diff=166724</id>
		<title>Mobile Top 10 2014-M10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M10&amp;diff=166724"/>
				<updated>2014-01-27T08:50:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Lack of Binary Protections&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Threat Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack Vector Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Security Weakness Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Technical Impacts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Business Impacts &amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Lack of Binary Protections?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
The Lack of Binary Protections category considers many security protections (or lack thereof) that are easy to implement but often go unused for mobile applications. Most of these protections are chosen at compile time. In general you should be aware of the following for mobile applications when compiling for production:&lt;br /&gt;
&lt;br /&gt;
* How to fully enable ASLR and Exploit mitigation protections.&lt;br /&gt;
* How to remove path and symbol information from the binary.&lt;br /&gt;
* How to use/enable framework provided memory management (to avoid memory leaks and code quality issues).&lt;br /&gt;
* How to implement simple certificate pinning.&lt;br /&gt;
* How to implement simple jailbreak/root detection.&lt;br /&gt;
* How to implement simple anti-debugging code.&lt;br /&gt;
* How to implement framework provided code obfuscation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Lack of Binary Protections?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
iOS Specific Examples:&lt;br /&gt;
* &lt;br /&gt;
 &lt;br /&gt;
Android Specific Examples&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=7}}&lt;br /&gt;
Example Scenarios&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=7}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M8&amp;diff=166723</id>
		<title>Mobile Top 10 2014-M8</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M8&amp;diff=166723"/>
				<updated>2014-01-27T08:49:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Security Decisions Via Untrusted Inputs&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Threat Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack Vector Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Security Weakness Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Technical Impacts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Business Impacts &amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=1|risk=7}}&lt;br /&gt;
You mobile application can accept data from all kinds of sources. In most cases this will be an Inter Process Communication (IPC) mechanism. In general try and adhere to the following IPC design patterns:&lt;br /&gt;
&lt;br /&gt;
* If there is a business requirement for IPC communication, the mobile application should restrict access to a white-list of trusted applications&lt;br /&gt;
* Sensitive actions which are triggered through IPC entry points should require user interaction before performing the action&lt;br /&gt;
* All input received from IPC entry points must undergo stringent input validation in order to prevent input driven attacks&lt;br /&gt;
* Do not pass any sensitive information through IPC mechanisms, as it may be susceptible to being read by third party applications under certain scenarios&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=2|risk=7}}&lt;br /&gt;
iOS Specific Examples:&lt;br /&gt;
* Do not use the deprecated handleOpenURL method to handle URL Scheme calls. This method does not contain an argument containing the BundleID of the source application.&lt;br /&gt;
** Instead use the openURL:sourceApplication:annotation method and validation the sourceApplication argument against a white-list of trusted applications&lt;br /&gt;
*Do not use the iOS Pasteboard for IPC communications, as it is susceptible to being set or read by all third party apps on the device.  &lt;br /&gt;
 &lt;br /&gt;
Android Specific Examples&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=7}}&lt;br /&gt;
Example Scenarios&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=7}}&lt;br /&gt;
References&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/c/ca/ASDC12-An_InDepth_Introduction_to_the_Android_Permissions_Modeland_How_to_Secure_MultiComponent_Applications.pdf An In Depth Introduction to the Android Permissions Modeland How to Secure MultiComponent Applications]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M7&amp;diff=166722</id>
		<title>Mobile Top 10 2014-M7</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M7&amp;diff=166722"/>
				<updated>2014-01-27T08:49:26Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Client Side Injection&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|MODERATE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Consider anyone who can send untrusted data to the system, including external users, internal users, and the application itself.  &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attacker loads simple text-based attacks that exploit the syntax of the targeted interpreter. Almost any source of data can be an injection vector, including resource files or the application itself. &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Client Side Injection for Mobile Applications is a mixed bag. To properly determine the Impact you must threat model the application. Injection attacks such as SQL Injection on client devices can be severe if your application deals with more than one user account on a single application or a shared device, or paid-for-only content. Other injection points are meant to overflow applications components but are less likely to achieve a high impact result because of the managed code protections of the application languages. &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;As stated the Impact of client side injections can vary depending on the type of data or type of the application. &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Business Impacts &amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=1|risk=4}}&lt;br /&gt;
&lt;br /&gt;
The best way to find out if an application is vulnerable to injection is to identify the sources of input and validate that user/application supplied data is being subject to input validation, disallowing code injection. Checking the code is a fast and accurate way to see if the application is handling data correctly. Code analysis tools can help a security analyst find the use of interpreters and trace the data flow through the application. Manual penetration testers can confirm these issues by crafting exploits that confirm the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since data can come from many sources in mobile applications we feel it is important list them delineated by what they are trying to achieve. In general injection attacks on mobile devices target the following:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Data on the Device:'''&lt;br /&gt;
&lt;br /&gt;
* SQL Injection: SQLite (many phones default data storing mechanism) can be subject to injection just like in web applications. The threat of being able to see data using this type of injection is risky when your application houses several different users, paid-for/unlockable content, etc.&lt;br /&gt;
* Local File Inclusion: File handling on mobile devices has the same risks as stated above except it pertains to reading files that might be yours to view inside the application directory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Mobile Users Session:'''&lt;br /&gt;
* JavaScript Injection (XSS, Etc): The mobile browser is subject to JavaScript injection as well. Usually the mobile browser has access to the mobile applications cookie, which can lead to session theft.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Application Interfaces or Functions:'''&lt;br /&gt;
* Several application interfaces or language functions can accept data and can be fuzzed to make applications crash. While most of these flaws do not lead to overflows because of the phone’s platforms being managed code, there have been several that have been used as a “userland” exploit in an exploit chain aimed at rooting or jailbreaking devices. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=2|risk=4}}&lt;br /&gt;
In general, protecting you application from client side injection requires looking at all the areas your application can receive data from and applying some sort of input validation. In certain cases this is simple but for others it is more complex, see below:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''iOS Specific Best Practices:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''SQLite Injection:''' When designing queries for SQLite be sure that user supplied data is being passed to a parameterized query. This can be spotted by looking for the format specifier used. In general, dangerous user supplied data will be inserted by a “%@” instead of a proper parameterized query specifer of “?”.&lt;br /&gt;
* '''JavaScript Injection (XSS, etc):''' Ensure that all UIWebView calls do not execute without proper input validation. Apply filters for dangerous JavaScript characters if possible, using a whitelist over blacklist character policy before rendering. If possible call mobile Safari instead of rending inside of UIWebkit which has access to your application.&lt;br /&gt;
* '''Local File Inclusion:''' Use input validation for NSFileManager calls. &lt;br /&gt;
* '''XML Injection:''' use libXML2 over NSXMLParser&lt;br /&gt;
* '''Format String Injection:''' Several Objective C methods are vulnerable to format string attacks:&lt;br /&gt;
** NSLog, [NSString stringWithFormat:], [NSString initWithFormat:], [NSMutableString appendFormat:], [NSAlert informativeTextWithFormat:], [NSPredicate predicateWithFormat:], [NSException format:], NSRunAlertPanel.&lt;br /&gt;
** Do not let sources outside of your control, such as user data and messages from other applications or web services, control any part of your format strings.&lt;br /&gt;
* '''Classic C Attacks:''' Objective C is a superset of C, avoid using old C functions vulnerable to injection such as: strcat, strcpy, strncat, strncpy, sprint, vsprintf, gets, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Android Specific Best Practices:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''SQL Injection:''' When dealing with dynamic queries or Content-Providers ensure you are using parameterized queries.&lt;br /&gt;
* '''JavaScript Injection (XSS):''' Verify that JavaScript and Plugin support is disabled for any WebViews (usually the default).&lt;br /&gt;
* '''Local File Inclusion:'''  Verify that File System Access is disabled for any WebViews (webview.getSettings().setAllowFileAccess(false);).&lt;br /&gt;
* '''Intent Injection/Fuzzing:''' Verify actions and data are validated via an Intent Filter for all Activities.&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=4}}&lt;br /&gt;
Example Scenarios&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=4}}&lt;br /&gt;
[https://developer.apple.com/library/mac/#documentation/security/conceptual/SecureCodingGuide Apple’s Secure Coding Guide]&lt;br /&gt;
&lt;br /&gt;
[http://blog.fortify.com/blog/2012/07/25/Format-Strings-Is-Objective-C-Objectively-Safer Fortify Software: Format Strings -  Is Objective C Objectively Safer?]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=FJvyLUjbAy0 Ilja Van Sprundel – Auditing iPhone and iPad Applications]&lt;br /&gt;
&lt;br /&gt;
[http://labs.mwrinfosecurity.com/blog/2012/04/23/adventures-with-android-webviews/ Adventures with Android WebViews]&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M6&amp;diff=166721</id>
		<title>Mobile Top 10 2014-M6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M6&amp;diff=166721"/>
				<updated>2014-01-27T08:49:15Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Broken Cryptography&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Anyone with access to data that has been encrypted improperly&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack vectors include physical access to the device and network traffic capture&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Encryption of mobile application data that can be successfully returned to plaintext by an unauthorized party&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Return of sensitive data to plaintext&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Loss of customer data, sensitive IP, or other critical information&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Broken Cryptography?||year=2014}}&lt;br /&gt;
The M6 category covers the various ways that insecure cryptography is used within mobile applications.&lt;br /&gt;
 &lt;br /&gt;
Insecure use of cryptography is common in most any application that uses encryption, and there are two mistakes in this area that lead to the most insecurity:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The Creation and Use of Custom Encryption Algorithms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Use of Insecure and/or Deprecated Algorithms&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Poor Key Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Creation and Use of Custom Encryption Protocols==&lt;br /&gt;
&lt;br /&gt;
There is no easier way to mishandle encryption--mobile or otherwise--than to try to create and use your own encryption algorithms or protocols.&lt;br /&gt;
&lt;br /&gt;
Always use modern algorithms that are accepted as strong by the security community, and whenever possible leverage the state of the art encryption APIs within your mobile platform.&lt;br /&gt;
&lt;br /&gt;
==Use of Insecure and/or Deprecated Algorithms==&lt;br /&gt;
&lt;br /&gt;
Many cryptographic algorithms and protocols should not be used because they have been shown to have significant weaknesses or are otherwise insufficient for modern security requirements. These include:&lt;br /&gt;
&lt;br /&gt;
* RC2&lt;br /&gt;
* MD4&lt;br /&gt;
* MD5&lt;br /&gt;
* SHA1&lt;br /&gt;
&lt;br /&gt;
==Poor Key Management==&lt;br /&gt;
&lt;br /&gt;
The best algorithms don't matter if you mishandle your keys. Many make the mistake of using the correct encryption algorithm, but implementing their own protocol for employing it. Some examples of problems here include:&lt;br /&gt;
&lt;br /&gt;
* Including the keys in the same attacker-readable directory as the encrypted content&lt;br /&gt;
* Making the keys otherwise available to the attacker&lt;br /&gt;
* Failing to use built-in encryption functionality&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=2}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M5&amp;diff=166720</id>
		<title>Mobile Top 10 2014-M5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M5&amp;diff=166720"/>
				<updated>2014-01-27T08:49:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Poor Authorization and Authentication&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Threat Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack Vector Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Security Weakness Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Technical Impacts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Business Impacts &amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=1|risk=5}}&lt;br /&gt;
Avoid the following Insecure Mobile Application Authentication Design Patterns:&lt;br /&gt;
&lt;br /&gt;
* Authentication requires that mobile applications should match the security protections that of the web application component. Therefore, it should not be possible to authenticate through with less authentication factors then it would be possible through the web browser.&lt;br /&gt;
* Authenticating a user locally can lead to client-side bypass vulnerabilities. If the application stores data locally, the authentication routine can be bypassed on jailbroken devices through runtime manipulation or modification of the binary.&lt;br /&gt;
* Ensure all authentication requests are performed server-side. Upon successful authentication, application data will be loaded onto the mobile device. This will ensure that application data will only be available after successful authentication.&lt;br /&gt;
* If client-side storage of data is required, the data will need to be encrypted using an encryption key that is securely derived from the user’s login credentials. This will ensure that the stored application data will only accessible upon successfully entering the correct credentials.&lt;br /&gt;
* Persistent authentication (Remember Me) functionality implemented within mobile applications should never be implemented by storing a user’s password on the device.&lt;br /&gt;
* Ideally, mobile applications should utilize a device-specific authentication token, which can be revoked within the web application by the user. This will ensure that unauthorized access can be mitigated in the event of a stolen/lost device.&lt;br /&gt;
* Do not use any spoof-able values for authenticating a user. This includes device identifiers or geo-location.&lt;br /&gt;
* Persistent authentication within mobile applications should be implemented as opt-in and not enabled by default&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=2|risk=5}}&lt;br /&gt;
Developers should assume all client-side authorization controls can be bypassed by malicious users. Authorization controls should be re-enforced server-side whenever possible.&lt;br /&gt;
 &lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=5}}&lt;br /&gt;
Example Scenarios&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=5}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M4&amp;diff=166719</id>
		<title>Mobile Top 10 2014-M4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M4&amp;diff=166719"/>
				<updated>2014-01-27T08:48:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jason Haddix: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Unintended Data Leakage&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Threat Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt; Attack Vector Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Security Weakness Description &amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Technical Impacts&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Business Impacts &amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Unintended Data Leakage?||year=2014}}&lt;br /&gt;
Unintended data leakage (formerly side-channel data leakage) is a branch of Insecure Data Storage. It includes all manner of vulnerabilities that can be introduced by the OS, frameworks, compiler environment, new hardware, etc, all without a developers knowledge. &lt;br /&gt;
&lt;br /&gt;
In the mobile development world this is most seen in undocumented (or under-documeted) internal processes such as:&lt;br /&gt;
&lt;br /&gt;
* The way the OS caches data, images, key-presses, logging, and buffers.&lt;br /&gt;
* The way the development framework caches data, images, key-presses, logging, and buffers.&lt;br /&gt;
* The way or amount of data ad, analytic, social, or enablement frameworks cache data, images, key-presses, logging, and buffers.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Unintended Data Leakage?||year=2014}}&lt;br /&gt;
It is important to threat model your OS, platforms, and frameworks, to see how they handle the following types of features:&lt;br /&gt;
&lt;br /&gt;
* URL Caching (Both request and response)&lt;br /&gt;
* Keyboard Press Caching&lt;br /&gt;
* Copy/Paste buffer Caching&lt;br /&gt;
* Application backgrounding&lt;br /&gt;
* Logging&lt;br /&gt;
* HTML5 data storage&lt;br /&gt;
* Browser cookie objects&lt;br /&gt;
* Analytics data sent to 3rd parties&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is especially important to discern what a given OS or framework does by default. By identifying this and applying mitigating controls, you can avoid unintended data leakage. Specific examples to follow.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=8}}&lt;br /&gt;
&lt;br /&gt;
==OS: iOS ==&lt;br /&gt;
* URL Caching (Both request and response)&lt;br /&gt;
* Keyboard Press Caching&lt;br /&gt;
* Copy/Paste buffer Caching&lt;br /&gt;
* Application backgrounding&lt;br /&gt;
* Logging&lt;br /&gt;
* HTML5 data storage&lt;br /&gt;
* Browser cookie objects&lt;br /&gt;
* Analytics data sent to 3rd parties&lt;br /&gt;
&lt;br /&gt;
==OS: Android ==&lt;br /&gt;
* URL Caching (Both request and response)&lt;br /&gt;
* Keyboard Press Caching&lt;br /&gt;
* Copy/Paste buffer Caching&lt;br /&gt;
* Application backgrounding&lt;br /&gt;
* Logging&lt;br /&gt;
* HTML5 data storage&lt;br /&gt;
* Browser cookie objects&lt;br /&gt;
* Analytics data sent to 3rd parties&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=8}}&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Jason Haddix</name></author>	</entry>

	</feed>