This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
From OWASP
(→Collaboration) (Tag: Visual edit) |
|||
(8 intermediate revisions by 2 users not shown) | |||
Line 231: | Line 231: | ||
* Jason Haddix | * Jason Haddix | ||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]] | ||
+ | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]] | ||
+ | |||
+ | == Collaboration == | ||
+ | [https://game-security.slack.com The Slack Channel] | ||
+ | |||
+ | == Resources == | ||
+ | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014] | ||
+ | |||
+ | == News and Events == | ||
+ | * Coming Soon | ||
+ | |||
+ | |} | ||
+ | |||
+ | = Exploits = | ||
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == Exploits == | ||
+ | |||
+ | This list refers to what a given attacker might use to take advantage of a given bug within the game. | ||
+ | |||
+ | {| class="wikitable" border="1" style="text-align: left" | ||
+ | ! Exploit | ||
+ | ! Description | ||
+ | |- | ||
+ | | '''DDoS''' | ||
+ | |Force a player to DC, or attack the game itself so that it cannot serve customers. | ||
+ | |- | ||
+ | | '''Client Modification''' | ||
+ | |Modify the client in a way that gives advantage. | ||
+ | |- | ||
+ | | '''Malicious Macros''' | ||
+ | |Implementation of macros that perform unwanted actions. | ||
+ | |- | ||
+ | | '''Social Engineering''' | ||
+ | |Getting a player, mod, or game staff member to perform an action that helps the attacker. | ||
+ | |- | ||
+ | | '''Use Physics Bug''' | ||
+ | |Interact with the world in a way that makes the physics engine do what the attacker wants. | ||
+ | |- | ||
+ | |'''Malform Network Traffic''' | ||
+ | |Send modified network traffic that tricks or disrupts an opposing player or the game itself. | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | {{Social Media Links}} | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == The Exploits Project == | ||
+ | |||
+ | The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal. | ||
+ | |||
+ | == Sub-project Leader == | ||
+ | |||
+ | * Daniel Miessler | ||
== Related Projects == | == Related Projects == | ||
Line 277: | Line 340: | ||
| '''Take Opponent Offline''' | | '''Take Opponent Offline''' | ||
|Take a player out of the game so that the attacker's position is improved. | |Take a player out of the game so that the attacker's position is improved. | ||
+ | |- | ||
+ | |'''Skip Content''' | ||
+ | |Allows player to skip content resuting in a faster completion or objective time | ||
|- | |- | ||
|} | |} | ||
Line 317: | Line 383: | ||
== Negative Outcomes == | == Negative Outcomes == | ||
− | The following is a list of possible | + | The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game. |
{| class="wikitable" border="1" style="text-align: left" | {| class="wikitable" border="1" style="text-align: left" | ||
− | ! | + | ! Outcomes |
! Description | ! Description | ||
|- | |- | ||
Line 326: | Line 392: | ||
|A player ends up with more currency than they were supposed to have. | |A player ends up with more currency than they were supposed to have. | ||
|- | |- | ||
− | | ''' | + | | '''Player Anger''' |
− | | | + | |Players become extremely agitated by one or more bugs. |
− | |||
− | |||
− | |||
|- | |- | ||
− | | '''Game | + | | '''Players Stop Playing the Game''' |
− | | | + | |Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game. |
− | |||
− | |||
|- | |- | ||
− | | ''' | + | | '''Invulnerable Positions''' |
− | | | + | |Locations on the map make bases or players unassailable and therefore invulnerable. |
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | | ''' | + | | '''Item Multiplication''' |
− | | | + | |Items are duplicated, multiplied, or otherwise increased in an unintended way. |
− | + | |- | |
− | + | |'''Unfair Ladder Victory''' | |
− | + | |A victory is scored in favor of a player or team when they should not have won. | |
− | + | |- | |
+ | |'''Unauthorized Admin Command Use''' | ||
+ | |Regular users are somehow able to execute administrative commands. | ||
|- | |- | ||
+ | |'''Lost Revenue''' | ||
+ | |The game company loses revenue due to bugs, hacks, and player anger. | ||
|} | |} | ||
Line 357: | Line 418: | ||
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == What is the | + | == What is the Negative Outcomes Project? == |
− | The | + | The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed. |
== Project Leader == | == Project Leader == | ||
Line 388: | Line 449: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Defenses == |
− | + | These are some of the common defenses that can be used to counter attacks against various components of a game. | |
− | + | {| class="wikitable" border="1" style="text-align: left" | |
− | + | ! Outcomes | |
− | + | ! Description | |
+ | |- | ||
+ | | '''Cryptographic Validation of Client''' | ||
+ | |Ensure that the client will not run if it has been modified. | ||
+ | |- | ||
+ | | '''Enterprise-level DDoS Protection''' | ||
+ | |Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure. | ||
+ | |- | ||
+ | | '''Basic Application Security Defenses''' | ||
+ | |Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc. | ||
+ | |- | ||
+ | |'''Authentication Lockouts''' | ||
+ | |Lock out a user's account after a certain number of failed attempts. | ||
+ | |- | ||
+ | |'''Two-factor Authentication''' | ||
+ | |Require use of 2FA on a given player's account. | ||
+ | |- | ||
+ | |'''Better Code''' | ||
+ | |Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc. | ||
+ | |- | ||
+ | |'''Server-side Validation''' | ||
+ | |Ensure that validations are performed on the server and not (only) the client. | ||
+ | |} | ||
{{Social Media Links}} | {{Social Media Links}} | ||
Line 503: | Line 586: | ||
| | | | ||
|} | |} | ||
− | '' | + | ''Working Data Collection Spreadsheet:'' |
+ | |||
+ | https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0 | ||
: | : |
Latest revision as of 17:46, 23 March 2017