This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
From OWASP
(→Main) |
|||
Line 106: | Line 106: | ||
|} | |} | ||
− | = Attack Surfaces = | + | = Game Attack Surfaces = |
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
Line 169: | Line 169: | ||
|} | |} | ||
− | = Vulnerabilities = | + | = Game Vulnerabilities = |
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == Game Security Vulnerabilities == | ||
+ | |||
+ | The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with. | ||
+ | |||
+ | {| border="1" class="wikitable" style="text-align: left" | ||
+ | ! Attack Surface | ||
+ | ! Description | ||
+ | |- | ||
+ | | '''Local Game Client''' | ||
+ | | | ||
+ | * Ability to edit in-game resources | ||
+ | * Ability to bypass license requirement | ||
+ | |- | ||
+ | | '''Game Network Traffic''' | ||
+ | | | ||
+ | * Network Denial of Service (player) | ||
+ | ** Player bandwidth exhaustion | ||
+ | ** Player game client resource exhaustion | ||
+ | |- | ||
+ | | '''Game Application Traffic''' | ||
+ | | | ||
+ | * Application Level Denial of Service (Player) | ||
+ | ** Player application logic Denial of Service | ||
+ | |- | ||
+ | | '''Game Server''' | ||
+ | | | ||
+ | * Application Level Denial of Service (Server) | ||
+ | ** Server application logic Denial of Service | ||
+ | * Ability to modify game ladder rankings | ||
+ | * Ability to modify own player resources | ||
+ | |- | ||
+ | | '''Game Economy''' | ||
+ | | | ||
+ | * Ability to generate unlimited money on client side | ||
+ | * Ability to generate unlimited money through network/application traffic modification | ||
+ | * Ability to modify prices for in-game items | ||
+ | * Ability to replay financial actions such as buying or selling through network/application manipulation | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == == | ||
+ | {{Social Media Links}} | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == What is the Game Security Vulnerabilities Project? == | ||
+ | |||
+ | The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under. | ||
+ | |||
+ | == Project Leaders == | ||
+ | |||
+ | * Jason Haddix | ||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]] | ||
+ | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]] | ||
+ | |||
+ | == Collaboration == | ||
+ | [https://game-security.slack.com The Slack Channel] | ||
+ | |||
+ | == Resources == | ||
+ | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014] | ||
+ | |||
+ | == News and Events == | ||
+ | * Coming Soon | ||
+ | |||
+ | |} | ||
+ | |||
+ | = Attacker Goals = | ||
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == Game Security Vulnerabilities == | ||
+ | |||
+ | The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with. | ||
+ | |||
+ | {| border="1" class="wikitable" style="text-align: left" | ||
+ | ! Attack Surface | ||
+ | ! Description | ||
+ | |- | ||
+ | | '''Local Game Client''' | ||
+ | | | ||
+ | * Ability to edit in-game resources | ||
+ | * Ability to bypass license requirement | ||
+ | |- | ||
+ | | '''Game Network Traffic''' | ||
+ | | | ||
+ | * Network Denial of Service (player) | ||
+ | ** Player bandwidth exhaustion | ||
+ | ** Player game client resource exhaustion | ||
+ | |- | ||
+ | | '''Game Application Traffic''' | ||
+ | | | ||
+ | * Application Level Denial of Service (Player) | ||
+ | ** Player application logic Denial of Service | ||
+ | |- | ||
+ | | '''Game Server''' | ||
+ | | | ||
+ | * Application Level Denial of Service (Server) | ||
+ | ** Server application logic Denial of Service | ||
+ | * Ability to modify game ladder rankings | ||
+ | * Ability to modify own player resources | ||
+ | |- | ||
+ | | '''Game Economy''' | ||
+ | | | ||
+ | * Ability to generate unlimited money on client side | ||
+ | * Ability to generate unlimited money through network/application traffic modification | ||
+ | * Ability to modify prices for in-game items | ||
+ | * Ability to replay financial actions such as buying or selling through network/application manipulation | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == == | ||
+ | {{Social Media Links}} | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == What is the Game Security Vulnerabilities Project? == | ||
+ | |||
+ | The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under. | ||
+ | |||
+ | == Project Leaders == | ||
+ | |||
+ | * Jason Haddix | ||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]] | ||
+ | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]] | ||
+ | |||
+ | == Collaboration == | ||
+ | [https://game-security.slack.com The Slack Channel] | ||
+ | |||
+ | == Resources == | ||
+ | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014] | ||
+ | |||
+ | == News and Events == | ||
+ | * Coming Soon | ||
+ | |||
+ | |} | ||
+ | |||
+ | = Negative Outcomes = | ||
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> |
Revision as of 05:33, 17 January 2017