This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Game Security Framework Project"
(→Classifications) (Tag: Visual edit) |
|||
Line 325: | Line 325: | ||
| '''Currency Magnification''' | | '''Currency Magnification''' | ||
|A player ends up with more currency than they were supposed to have. | |A player ends up with more currency than they were supposed to have. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
| '''Game Network Traffic''' | | '''Game Network Traffic''' |
Revision as of 07:40, 23 March 2017
- About the Project
- Attack Surfaces
- Vulnerabilities
- Attacker Goals
- Technical Impacts
- Defenses
- Examples
- Community
- Testing Tools
- Project About
OWASP Game Security Framework (GSF)The OWASP Game Security Framework (GSF) represents a modular approach to understanding the security issues that surround video game ecosystems. In 2016 the videogame market became 99.6 Billion dollar industry... any why shouldn't it be? Some of the most prolific and complex software developed today are video games. They are professionally played, sponsored, scrutinized, monetized, and celebrated, just like many sports. They handle clients, servers, web components, monetary transfers, social interactions, virtual markets, etc, with every bit the need of security that most internet hosted apps have (if not more in some cases). The GSF is designed to help threat model gaming issues that have devastated new games. Most importantly we hope the GSF can help new developers and security testers alike root out bugs in your favorite titles. The framework is broken into three main concepts / sections:
LicensingThe OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is the OWASP Game Security Framework?The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games. The target audience for the project includes:
Project Leaders
Contributors
Related Projects |
CollaborationQuick DownloadCOMING SOON News and Events
Classifications |
Attack SurfacesThe following is a list of the attack surfaces that can be found in video games of various types.
|
What is the Attack Surfaces Section?This section provides an overview of the various places an attacker can target to harm a given game infrastructure. Sub-project Leader
Related ProjectsCollaborationQuick Download
News and Events
|
Game Security VulnerabilitiesThe following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.
|
What is the Game Security Vulnerabilities Project?The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under. Sub-project Leader
Related ProjectsCollaborationResourcesNews and Events
|
Attacker GoalsThis list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.
|
What is the Attacker Goals ProjectThe Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking. Sub-project Leader
Related ProjectsCollaborationResourcesNews and Events
|
Technical ImpactsThe following is a list of possible technical or tactical outcomes that can occur as the result of someone attacking a given game.
|
What is the Game Security Vulnerabilities Project?The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under. Project Leader
Related ProjectsCollaborationResourcesNews and Events
|
Common Game Security DefensesTable Here
|
What is the Game Security Vulnerabilities Project?The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under. Project Leaders
Related ProjectsCollaborationResourcesNews and Events
|
Real-world Examples of Gaming Vulnerabilities
Vulnerability
ID | Vulnerabilty Name | Description | Surface Area | Goal | Techical Impact | Business Impact | Defense | Ref | Game | Genre |
---|---|---|---|---|---|---|---|---|---|---|
V1 | Local Resource Modification, Client-side Logic Flaw | In 2015 The Division experienced an exploit that allowed an attacker to switch weapons rapidly, applying weapon buffs in a stacking manner, with no cap. | Game Client | Unfair Player Advantage | Player Anger | Players leave, Lost Revenue | Cryptographic Integrity Checks on Game Client | http://www.gamesradar.com/theres-a-division-damage-stacking-glitch-if-youve-got-fast-fingers/ | 3PS/1PS/MMO | |
VN1 | "The attacker attacked and edited the LOCAL GAME CLIENT (Attack Surface) , which had a LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability) , which allowed her to ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal) , ultimately leading to an UNHAPPY PLAYER BASE (Negative Outcome) and DECLINING GAME REVENUE (Negative Outcome) due to cheating, which could have been prevented by CRYPTOGRAPHIC INTEGRITY CHECKS ON GAME CLIENT ”
| |||||||||
Template
We are actively looking for people to help in the following areas:
- Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.
- Adding content to any of the various sections
- Input from avid gamers on how useful this is to them
- Input from app security experts
- Input from security types working at gaming companies
- Input from game company business types
If you have interest in helping, reach out to us and we'll make you a contributor.
Commonly Used Game Hacking Tools
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|