This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
From OWASP
(Updating tab names.) |
(→Common Game Security Defenses) (Tag: Visual edit) |
||
Line 520: | Line 520: | ||
== Real-world Examples of Gaming Vulnerabilities== | == Real-world Examples of Gaming Vulnerabilities== | ||
− | ''Vulnerability | + | ''Vulnerability'' |
{| class="wikitable" | {| class="wikitable" | ||
+ | !ID | ||
! style="font-weight: bold;" | Vulnerabilty Name | ! style="font-weight: bold;" | Vulnerabilty Name | ||
! style="font-weight: bold;" | Description | ! style="font-weight: bold;" | Description | ||
! style="font-weight: bold;" | Surface Area | ! style="font-weight: bold;" | Surface Area | ||
− | ! style="font-weight: bold;" | | + | ! style="font-weight: bold;" | Goal |
− | ! style="font-weight: bold;" | | + | ! style="font-weight: bold;" | Techical Impact |
− | ! | + | !Business Impact |
! style="font-weight: bold;" | Defense | ! style="font-weight: bold;" | Defense | ||
! Ref | ! Ref | ||
+ | !Game | ||
! Genre | ! Genre | ||
|- | |- | ||
+ | |V1 | ||
| Local Resource Modification, Client-side Logic Flaw | | Local Resource Modification, Client-side Logic Flaw | ||
| In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap. | | In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap. | ||
| Game Client | | Game Client | ||
| Unfair Player Advantage | | Unfair Player Advantage | ||
− | | Player Anger, Lost Revenue | + | | Player Anger |
− | + | |Players leave, Lost Revenue | |
| Cryptographic Integrity Checks on Game Client | | Cryptographic Integrity Checks on Game Client | ||
| http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/ | | http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/ | ||
+ | | | ||
| 3PS/1PS/MMO | | 3PS/1PS/MMO | ||
|- | |- | ||
− | | colspan=" | + | |VN1 |
+ | | colspan="10" style="text-align: center;" | "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>, which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> due to cheating, which could have been prevented by <code>CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT</code>” | ||
|- | |- | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | | ||
| | | | ||
| | | | ||
Line 550: | Line 592: | ||
| | | | ||
| | | | ||
+ | | | ||
| | | | ||
| | | | ||
− | | | + | | |
| | | | ||
|} | |} | ||
− | ''Template | + | ''Template'' |
− | : | + | : |
{{Social Media Links}} | {{Social Media Links}} |
Revision as of 19:15, 22 March 2017