This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
From OWASP
(→Related Projects) (Tag: Visual edit) |
(→Collaboration) (Tag: Visual edit) |
||
(6 intermediate revisions by 2 users not shown) | |||
Line 231: | Line 231: | ||
* Jason Haddix | * Jason Haddix | ||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]] | ||
+ | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]] | ||
+ | |||
+ | == Collaboration == | ||
+ | [https://game-security.slack.com The Slack Channel] | ||
+ | |||
+ | == Resources == | ||
+ | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014] | ||
+ | |||
+ | == News and Events == | ||
+ | * Coming Soon | ||
+ | |||
+ | |} | ||
+ | |||
+ | = Exploits = | ||
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == Exploits == | ||
+ | |||
+ | This list refers to what a given attacker might use to take advantage of a given bug within the game. | ||
+ | |||
+ | {| class="wikitable" border="1" style="text-align: left" | ||
+ | ! Exploit | ||
+ | ! Description | ||
+ | |- | ||
+ | | '''DDoS''' | ||
+ | |Force a player to DC, or attack the game itself so that it cannot serve customers. | ||
+ | |- | ||
+ | | '''Client Modification''' | ||
+ | |Modify the client in a way that gives advantage. | ||
+ | |- | ||
+ | | '''Malicious Macros''' | ||
+ | |Implementation of macros that perform unwanted actions. | ||
+ | |- | ||
+ | | '''Social Engineering''' | ||
+ | |Getting a player, mod, or game staff member to perform an action that helps the attacker. | ||
+ | |- | ||
+ | | '''Use Physics Bug''' | ||
+ | |Interact with the world in a way that makes the physics engine do what the attacker wants. | ||
+ | |- | ||
+ | |'''Malform Network Traffic''' | ||
+ | |Send modified network traffic that tricks or disrupts an opposing player or the game itself. | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | {{Social Media Links}} | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == The Exploits Project == | ||
+ | |||
+ | The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal. | ||
+ | |||
+ | == Sub-project Leader == | ||
+ | |||
+ | * Daniel Miessler | ||
== Related Projects == | == Related Projects == | ||
Line 277: | Line 340: | ||
| '''Take Opponent Offline''' | | '''Take Opponent Offline''' | ||
|Take a player out of the game so that the attacker's position is improved. | |Take a player out of the game so that the attacker's position is improved. | ||
+ | |- | ||
+ | |'''Skip Content''' | ||
+ | |Allows player to skip content resuting in a faster completion or objective time | ||
|- | |- | ||
|} | |} | ||
Line 320: | Line 386: | ||
{| class="wikitable" border="1" style="text-align: left" | {| class="wikitable" border="1" style="text-align: left" | ||
− | ! | + | ! Outcomes |
! Description | ! Description | ||
|- | |- | ||
Line 343: | Line 409: | ||
|'''Unauthorized Admin Command Use''' | |'''Unauthorized Admin Command Use''' | ||
|Regular users are somehow able to execute administrative commands. | |Regular users are somehow able to execute administrative commands. | ||
+ | |- | ||
+ | |'''Lost Revenue''' | ||
+ | |The game company loses revenue due to bugs, hacks, and player anger. | ||
|} | |} | ||
Line 380: | Line 449: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Defenses == |
− | + | These are some of the common defenses that can be used to counter attacks against various components of a game. | |
− | + | {| class="wikitable" border="1" style="text-align: left" | |
− | + | ! Outcomes | |
− | + | ! Description | |
+ | |- | ||
+ | | '''Cryptographic Validation of Client''' | ||
+ | |Ensure that the client will not run if it has been modified. | ||
+ | |- | ||
+ | | '''Enterprise-level DDoS Protection''' | ||
+ | |Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure. | ||
+ | |- | ||
+ | | '''Basic Application Security Defenses''' | ||
+ | |Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc. | ||
+ | |- | ||
+ | |'''Authentication Lockouts''' | ||
+ | |Lock out a user's account after a certain number of failed attempts. | ||
+ | |- | ||
+ | |'''Two-factor Authentication''' | ||
+ | |Require use of 2FA on a given player's account. | ||
+ | |- | ||
+ | |'''Better Code''' | ||
+ | |Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc. | ||
+ | |- | ||
+ | |'''Server-side Validation''' | ||
+ | |Ensure that validations are performed on the server and not (only) the client. | ||
+ | |} | ||
{{Social Media Links}} | {{Social Media Links}} | ||
Line 495: | Line 586: | ||
| | | | ||
|} | |} | ||
− | '' | + | ''Working Data Collection Spreadsheet:'' |
+ | |||
+ | https://docs.google.com/spreadsheets/d/1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/edit#gid=0 | ||
: | : |
Latest revision as of 17:46, 23 March 2017