|
|
Line 325: |
Line 325: |
| | '''Currency Magnification''' | | | '''Currency Magnification''' |
| |A player ends up with more currency than they were supposed to have. | | |A player ends up with more currency than they were supposed to have. |
− | |-
| |
− | | '''Game Network Traffic'''
| |
− | |
| |
− | * Network Denial of Service (player)
| |
− | ** Player bandwidth exhaustion
| |
− | ** Player game client resource exhaustion
| |
− | |-
| |
− | | '''Game Application Traffic'''
| |
− | |
| |
− | * Application Level Denial of Service (Player)
| |
− | ** Player application logic Denial of Service
| |
− | |-
| |
− | | '''Game Server'''
| |
− | |
| |
− | * Application Level Denial of Service (Server)
| |
− | ** Server application logic Denial of Service
| |
− | * Ability to modify game ladder rankings
| |
− | * Ability to modify own player resources
| |
− | |-
| |
− | | '''Game Economy'''
| |
− | |
| |
− | * Ability to generate unlimited money on client side
| |
− | * Ability to generate unlimited money through network/application traffic modification
| |
− | * Ability to modify prices for in-game items
| |
− | * Ability to replay financial actions such as buying or selling through network/application manipulation
| |
− | |-
| |
− | |}
| |
− |
| |
− | {{Social Media Links}}
| |
− |
| |
− | | valign="top" style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" |
| |
− |
| |
− | == What is the Game Security Vulnerabilities Project? ==
| |
− |
| |
− | The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.
| |
− |
| |
− | == Project Leader ==
| |
− |
| |
− | * Daniel Miessler
| |
− |
| |
− | == Related Projects ==
| |
− |
| |
− | * [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]
| |
− | * [[OWASP_Top_Ten_Project|OWASP Web Top 10]]
| |
− |
| |
− | == Collaboration ==
| |
− | [https://game-security.slack.com The Slack Channel]
| |
− |
| |
− | == Resources ==
| |
− | * [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]
| |
− |
| |
− | == News and Events ==
| |
− | * Coming Soon
| |
− |
| |
− | |}
| |
− |
| |
− | = Business Impacts =
| |
− |
| |
− | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
| |
− |
| |
− | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
| |
− | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
| |
− |
| |
− | == Game Security Vulnerabilities ==
| |
− |
| |
− | The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.
| |
− |
| |
− | {| class="wikitable" border="1" style="text-align: left"
| |
− | ! Attack Surface
| |
− | ! Description
| |
− | |-
| |
− | | '''Local Game Client'''
| |
− | |
| |
− | * Ability to edit in-game resources
| |
− | * Ability to bypass license requirement
| |
| |- | | |- |
| | '''Game Network Traffic''' | | | '''Game Network Traffic''' |