This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
From OWASP
(→Collaboration) (Tag: Visual edit) |
|||
Line 248: | Line 248: | ||
|} | |} | ||
− | = | + | = Exploits = |
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
Line 255: | Line 255: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Exploits == |
− | This list refers to what a given attacker might | + | This list refers to what a given attacker might use to take advantage of a given bug within the game. |
{| class="wikitable" border="1" style="text-align: left" | {| class="wikitable" border="1" style="text-align: left" | ||
− | ! | + | ! Exploit |
! Description | ! Description | ||
|- | |- | ||
− | | ''' | + | | '''DDoS''' |
− | | | + | |Force a player to DC, or attack the game itself so that it cannot serve customers. |
|- | |- | ||
− | | ''' | + | | '''Client Modification''' |
− | | | + | |Modify the client in a way that gives advantage. |
|- | |- | ||
− | | ''' | + | | '''Malicious Macros''' |
− | | | + | |Implementation of macros that perform unwanted actions. |
|- | |- | ||
− | | ''' | + | | '''Social Engineering''' |
− | | | + | |Getting a player, mod, or game staff member to perform an action that helps the attacker. |
|- | |- | ||
− | | ''' | + | | '''Use Physics Bug''' |
− | | | + | |Interact with the world in a way that makes the physics engine do what the attacker wants. |
|- | |- | ||
− | |''' | + | |'''Malform Network Traffic''' |
− | | | + | |Send modified network traffic that tricks or disrupts an opposing player or the game itself. |
|- | |- | ||
|} | |} | ||
Line 287: | Line 287: | ||
| valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == The Exploits Project == |
− | The | + | The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal. |
== Sub-project Leader == | == Sub-project Leader == |
Latest revision as of 17:46, 23 March 2017