This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
From OWASP
(→Common Game Security Defenses) |
(→Collaboration) (Tag: Visual edit) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 231: | Line 231: | ||
* Jason Haddix | * Jason Haddix | ||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]] | ||
+ | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]] | ||
+ | |||
+ | == Collaboration == | ||
+ | [https://game-security.slack.com The Slack Channel] | ||
+ | |||
+ | == Resources == | ||
+ | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014] | ||
+ | |||
+ | == News and Events == | ||
+ | * Coming Soon | ||
+ | |||
+ | |} | ||
+ | |||
+ | = Exploits = | ||
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == Exploits == | ||
+ | |||
+ | This list refers to what a given attacker might use to take advantage of a given bug within the game. | ||
+ | |||
+ | {| class="wikitable" border="1" style="text-align: left" | ||
+ | ! Exploit | ||
+ | ! Description | ||
+ | |- | ||
+ | | '''DDoS''' | ||
+ | |Force a player to DC, or attack the game itself so that it cannot serve customers. | ||
+ | |- | ||
+ | | '''Client Modification''' | ||
+ | |Modify the client in a way that gives advantage. | ||
+ | |- | ||
+ | | '''Malicious Macros''' | ||
+ | |Implementation of macros that perform unwanted actions. | ||
+ | |- | ||
+ | | '''Social Engineering''' | ||
+ | |Getting a player, mod, or game staff member to perform an action that helps the attacker. | ||
+ | |- | ||
+ | | '''Use Physics Bug''' | ||
+ | |Interact with the world in a way that makes the physics engine do what the attacker wants. | ||
+ | |- | ||
+ | |'''Malform Network Traffic''' | ||
+ | |Send modified network traffic that tricks or disrupts an opposing player or the game itself. | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | {{Social Media Links}} | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == The Exploits Project == | ||
+ | |||
+ | The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal. | ||
+ | |||
+ | == Sub-project Leader == | ||
+ | |||
+ | * Daniel Miessler | ||
== Related Projects == | == Related Projects == | ||
Line 277: | Line 340: | ||
| '''Take Opponent Offline''' | | '''Take Opponent Offline''' | ||
|Take a player out of the game so that the attacker's position is improved. | |Take a player out of the game so that the attacker's position is improved. | ||
+ | |- | ||
+ | |'''Skip Content''' | ||
+ | |Allows player to skip content resuting in a faster completion or objective time | ||
|- | |- | ||
|} | |} | ||
Line 383: | Line 449: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Defenses == |
− | + | These are some of the common defenses that can be used to counter attacks against various components of a game. | |
{| class="wikitable" border="1" style="text-align: left" | {| class="wikitable" border="1" style="text-align: left" | ||
! Outcomes | ! Outcomes | ||
! Description | ! Description | ||
|- | |- | ||
− | | ''' | + | | '''Cryptographic Validation of Client''' |
− | | | + | |Ensure that the client will not run if it has been modified. |
|- | |- | ||
− | | ''' | + | | '''Enterprise-level DDoS Protection''' |
− | | | + | |Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure. |
|- | |- | ||
− | | ''' | + | | '''Basic Application Security Defenses''' |
− | | | + | |Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc. |
− | |- | + | |- |
− | | ''' | + | |'''Authentication Lockouts''' |
− | | | + | |Lock out a user's account after a certain number of failed attempts. |
− | |||
− | |||
− | |||
|- | |- | ||
− | |''' | + | |'''Two-factor Authentication''' |
− | | | + | |Require use of 2FA on a given player's account. |
|- | |- | ||
− | |''' | + | |'''Better Code''' |
− | | | + | |Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc. |
|- | |- | ||
− | |''' | + | |'''Server-side Validation''' |
− | | | + | |Ensure that validations are performed on the server and not (only) the client. |
|} | |} | ||
Latest revision as of 17:46, 23 March 2017