The Game Security
Framework
(1.0)
Jason Haddix & Daniel Miessler
Us
• Jason Haddix:
Head of Trust and
Security, Bugcrowd
• Daniel Miessler:
Director of Advisory
Services, IOActive
@jhaddix @danielmiessler
History
• This is the second try for the project
• Tried originally in 2014, to no avail
3
Concept
4
Structure
• Normal, English sentences that are used to describe the
entire scenario
• Each sentence contains placeholders for the various parts
of the risk


malicious competitor attacks the server-side and takes
advantage of limited server-side bandwidth and uses ddos
to cause extreme lag that lets them win a match, resulting
in frustrated users not playing the game anymore, which
could have been avoided using ddos protection.
5
Structure
6
https://www.owasp.org/index.php/
OWASP_Game_Security_Framework_Project
Semantic Structure
Actor attacks Attack Surface and uses
Exploit to take advantage of
Vulnerability to try to achieve their
Goal, resulting in Negative Outcome,
which could have been avoided by Defense.
7
Vulnerabilities
8
Ping + Teleport
9
1. Mess with your own connection
2. Server starts reporting your location sporadically
3. Allows you to pass through objects
4. BONUS: Avoid being attacked because you’re like a ghost
Player attacks the network and takes advantage of throttling and uses
connection degradation to cause extreme lag that lets them avoid harm,
resulting in frustrated users not playing the game anymore, which could
have been avoided using better code.
Moar Mosters
10
1. When logged in as an admin there are options to do lots of
things, like call monsters
2. Players figure out they can execute admin commands as well
(only the menu was missing)
3. They get in nasty PvP and call in tons of nasty mobs to crush
enemies
Player attacks the server and takes advantage of client-side filters and
uses hidden admin commands to cause in game chaos that lets them survive
pvp, resulting in frustrated users not playing the game anymore, which
could have been avoided using server-side controls.
Midnight Store
11
1. Game bugs required the server to be restarted at
midnight
2. If you were in the middle of a trade when the server
went down, both players got both sides of the trade
Player attacks the game and takes advantage of logic bug and uses
knowledge of bug to cause item duplication that lets them unfairly
increase loot, resulting in less need to buy things, which could have been
avoided using better code.
Marvel at my DC
12
1. Play a Star Wars game on Android
2. Go into Airplane Mode in the middle of the game
3. Run Android hack to automatically win
4. Reconnect, advance on the ladder
Player attacks the client and takes advantage of local hack and logic flaw
and uses local hack to cause unfair ladder win that lets them, resulting in
ladder chaos, which could have been avoided using better code.
Ooh Sparkly
13
1. Launching lots of graphics-intensive actions could cause frame
rate drops
2. People load up on the most graphics-intensive combos and fire
them off if they’re attacked
3. Nobody could kill them because they could run away while their
game is lagging
Player attacks the client and takes advantage of resource constraints and
uses knowledge of bug to cause unfair pvp advantage that lets them avoid
death during pvp, resulting in angry players and fewer users, which could
have been avoided using better code.
Pink Unicorns
14
1. Players find hidden coordinates in network stream data
2. They hack the client to show hidden items on the map
3. They find hidden players and items before everyone else
4. PK or dramatically improved farming
Player attacks the client and takes advantage of client-side filters and
uses client modification to cause see hidden content that lets them pk and
farm, resulting in frustrated users not playing the game anymore, which
could have been avoided using client integrity validation.
Dishonorable Mentions
15
1. Convincing players to download a mod so we can “powerlevel you”.
2. Changing your username to look like a GM, and telling people to give you their items
(for safe keeping).
3. Multiple buff stacking due to race conditions / logic flaws.
4. Death / looting issues that allow you to loot dead bodies and get their gear without the
person losing the gear when they respawn.
5. Numerous DC logic flaws, where fighting, looting, purchasing is all broken when you
DC your connection. As a developer, how would you handle it?
6. Powerleveling service takes your account for a day or so and you soon get a notification
that you’ve been banned (they used you for money laundering).
7. …etc, etc.
Case Study
16
Mobile Cover Clipping
17
1. Use of a skill (Mobile Cover) allows players to skip
content
2. Skipping content allows after farming rates of bosses
Player attacks the client and takes advantage of Game Mechanics and uses
knowledge of bug to skip content that lets them farm items faster,
resulting in angry players and fewer users, which could have been avoided
using better code.
Mobile Cover Clipping
18
https://www.youtube.com/watch?v=kAq2283F7vs
instancing and
checkpoints
19
1. Players able to enter a different area (instance) to re-
spawn bosses
Player attacks the client and takes advantage of Game Mechanics and uses
knowledge of bug to skip content that lets them farm items faster,
resulting in angry players and fewer users, which could have been avoided
using better code.
instancing and
checkpoint manipulation
20
https://www.youtube.com/watch?v=Wj8OXIOJvhE
buff/talent stacking
21
1. switching gear rapidly caused buffs or talents to “stack”
allowing using talents to gain 1 shot kills, infinite money
of headshots, etc.
Player attacks the client and takes advantage of Game Mechanics and uses
knowledge of bug to Gain In-game Currency and Enhance Gear, resulting
in angry players and fewer users, which could have been avoided using
better code.
buff/talent stacking
22
https://www.youtube.com/watch?v=pPsKEXmnL_E
Current State
23
• Capturing as many bugs as possible
• Categorizing them
• Putting them into the framework
Current State
24
Current State
25
Future State
26
• Moar Bugz (crowdsourced)
• Continuous improvement of schema
• Additional ideas for improvement
Next Steps & Help
27
• If you know any game bugs, you can help out at this location:
https://docs.google.com/spreadsheets/d/
1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/
edit#gid=0
• We also just started a Slack channel, in case you don’t already
have enough of those.
Thanks & Contact
28
• Jason Haddix

Bugcrowd



@jhaddix
• Daniel Miessler

IOActive



@danielmiessler
https://www.owasp.org/index.php/
OWASP_Game_Security_Framework_Project

More Related Content

PDF
Plunder Pirates Hack tool
PDF
Evolution of The Application
PPTX
The OWASP Game Security Framework
PPTX
Developers vs Cybercriminals: Protecting your MMO from online crime
PPTX
Making an independend MMO - The Albion Online Story
PPT
k.onlineGaming.ppt
PDF
The post release technologies of Crysis 3 (Annotated Slides) - Stewart Needham
PPTX
Five Cliches of Online Game Development
Plunder Pirates Hack tool
Evolution of The Application
The OWASP Game Security Framework
Developers vs Cybercriminals: Protecting your MMO from online crime
Making an independend MMO - The Albion Online Story
k.onlineGaming.ppt
The post release technologies of Crysis 3 (Annotated Slides) - Stewart Needham
Five Cliches of Online Game Development

Similar to The Game Security Framework (20)

PPTX
Video Game Security
PDF
Albion Online - Software Architecture of an MMO (talk at Quo Vadis 2016, Berlin)
PDF
Eight Rules for Making Your First Great Game
PPT
Designing A Casual MMO
PPT
Game as a service - do you know what it means?
PDF
Sony: the Safety Landscape in 2023.pdf
PDF
COMP521-report
PDF
Abusing mobilegames
PPTX
C13_172.pptx
PPTX
Optimising a social mobile game
PDF
[GAMENEXT] 소규모로 효율적인 북미시장 공략 (픽셀아모)
PPT
Game Design 3 - MMOs and Game Notation
PDF
P2P Multiplayer Gaming
PPTX
Game as a service @ ProGaming DevFest#8
DOCX
Project 4 Formal Proposal
PDF
Lecture 7 - Experience Management
PPT
Harlan beverly gaming levels up networking ieee 10 2009
PPTX
David Brevik - LOGIN Conference 2012
PPTX
Les 1 ppt
PPTX
Les 1 ppt
Video Game Security
Albion Online - Software Architecture of an MMO (talk at Quo Vadis 2016, Berlin)
Eight Rules for Making Your First Great Game
Designing A Casual MMO
Game as a service - do you know what it means?
Sony: the Safety Landscape in 2023.pdf
COMP521-report
Abusing mobilegames
C13_172.pptx
Optimising a social mobile game
[GAMENEXT] 소규모로 효율적인 북미시장 공략 (픽셀아모)
Game Design 3 - MMOs and Game Notation
P2P Multiplayer Gaming
Game as a service @ ProGaming DevFest#8
Project 4 Formal Proposal
Lecture 7 - Experience Management
Harlan beverly gaming levels up networking ieee 10 2009
David Brevik - LOGIN Conference 2012
Les 1 ppt
Les 1 ppt
Ad

More from Daniel Miessler (11)

PPTX
Practical IoT Security in the Enterprise
PDF
The IoT Attack Surface
PDF
Implementing Inexpensive Honeytrap Techniques
PDF
Securing Medical Devices Using Adaptive Testing Methodologies
PPTX
Peak Prevention: Moving from Prevention to Resilience
PPTX
Adaptive Testing Methodology [ ATM ]
PDF
IoT Attack Surfaces -- DEFCON 2015
PDF
SecLists @ BlackHat Arsenal 2015
PDF
RSA2015: Securing the Internet of Things
PDF
The Real Internet of Things: How Universal Daemonization Will Change Everything
PPTX
Understanding Cross-site Request Forgery
Practical IoT Security in the Enterprise
The IoT Attack Surface
Implementing Inexpensive Honeytrap Techniques
Securing Medical Devices Using Adaptive Testing Methodologies
Peak Prevention: Moving from Prevention to Resilience
Adaptive Testing Methodology [ ATM ]
IoT Attack Surfaces -- DEFCON 2015
SecLists @ BlackHat Arsenal 2015
RSA2015: Securing the Internet of Things
The Real Internet of Things: How Universal Daemonization Will Change Everything
Understanding Cross-site Request Forgery
Ad

Recently uploaded (20)

PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
substrate PowerPoint Presentation basic one
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
SaaS reusability assessment using machine learning techniques
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Decision Optimization - From Theory to Practice
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Examining Bias in AI Generated News Content.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
Advancing precision in air quality forecasting through machine learning integ...
substrate PowerPoint Presentation basic one
giants, standing on the shoulders of - by Daniel Stenberg
SaaS reusability assessment using machine learning techniques
LMS bot: enhanced learning management systems for improved student learning e...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Ensemble model-based arrhythmia classification with local interpretable model...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
CEH Module 2 Footprinting CEH V13, concepts
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Decision Optimization - From Theory to Practice
Rapid Prototyping: A lecture on prototyping techniques for interface design
Module 1 Introduction to Web Programming .pptx
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Examining Bias in AI Generated News Content.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
NewMind AI Weekly Chronicles – August ’25 Week IV

The Game Security Framework

  • 1. The Game Security Framework (1.0) Jason Haddix & Daniel Miessler
  • 2. Us • Jason Haddix: Head of Trust and Security, Bugcrowd • Daniel Miessler: Director of Advisory Services, IOActive @jhaddix @danielmiessler
  • 3. History • This is the second try for the project • Tried originally in 2014, to no avail 3
  • 5. Structure • Normal, English sentences that are used to describe the entire scenario • Each sentence contains placeholders for the various parts of the risk 
 malicious competitor attacks the server-side and takes advantage of limited server-side bandwidth and uses ddos to cause extreme lag that lets them win a match, resulting in frustrated users not playing the game anymore, which could have been avoided using ddos protection. 5
  • 7. Semantic Structure Actor attacks Attack Surface and uses Exploit to take advantage of Vulnerability to try to achieve their Goal, resulting in Negative Outcome, which could have been avoided by Defense. 7
  • 9. Ping + Teleport 9 1. Mess with your own connection 2. Server starts reporting your location sporadically 3. Allows you to pass through objects 4. BONUS: Avoid being attacked because you’re like a ghost Player attacks the network and takes advantage of throttling and uses connection degradation to cause extreme lag that lets them avoid harm, resulting in frustrated users not playing the game anymore, which could have been avoided using better code.
  • 10. Moar Mosters 10 1. When logged in as an admin there are options to do lots of things, like call monsters 2. Players figure out they can execute admin commands as well (only the menu was missing) 3. They get in nasty PvP and call in tons of nasty mobs to crush enemies Player attacks the server and takes advantage of client-side filters and uses hidden admin commands to cause in game chaos that lets them survive pvp, resulting in frustrated users not playing the game anymore, which could have been avoided using server-side controls.
  • 11. Midnight Store 11 1. Game bugs required the server to be restarted at midnight 2. If you were in the middle of a trade when the server went down, both players got both sides of the trade Player attacks the game and takes advantage of logic bug and uses knowledge of bug to cause item duplication that lets them unfairly increase loot, resulting in less need to buy things, which could have been avoided using better code.
  • 12. Marvel at my DC 12 1. Play a Star Wars game on Android 2. Go into Airplane Mode in the middle of the game 3. Run Android hack to automatically win 4. Reconnect, advance on the ladder Player attacks the client and takes advantage of local hack and logic flaw and uses local hack to cause unfair ladder win that lets them, resulting in ladder chaos, which could have been avoided using better code.
  • 13. Ooh Sparkly 13 1. Launching lots of graphics-intensive actions could cause frame rate drops 2. People load up on the most graphics-intensive combos and fire them off if they’re attacked 3. Nobody could kill them because they could run away while their game is lagging Player attacks the client and takes advantage of resource constraints and uses knowledge of bug to cause unfair pvp advantage that lets them avoid death during pvp, resulting in angry players and fewer users, which could have been avoided using better code.
  • 14. Pink Unicorns 14 1. Players find hidden coordinates in network stream data 2. They hack the client to show hidden items on the map 3. They find hidden players and items before everyone else 4. PK or dramatically improved farming Player attacks the client and takes advantage of client-side filters and uses client modification to cause see hidden content that lets them pk and farm, resulting in frustrated users not playing the game anymore, which could have been avoided using client integrity validation.
  • 15. Dishonorable Mentions 15 1. Convincing players to download a mod so we can “powerlevel you”. 2. Changing your username to look like a GM, and telling people to give you their items (for safe keeping). 3. Multiple buff stacking due to race conditions / logic flaws. 4. Death / looting issues that allow you to loot dead bodies and get their gear without the person losing the gear when they respawn. 5. Numerous DC logic flaws, where fighting, looting, purchasing is all broken when you DC your connection. As a developer, how would you handle it? 6. Powerleveling service takes your account for a day or so and you soon get a notification that you’ve been banned (they used you for money laundering). 7. …etc, etc.
  • 17. Mobile Cover Clipping 17 1. Use of a skill (Mobile Cover) allows players to skip content 2. Skipping content allows after farming rates of bosses Player attacks the client and takes advantage of Game Mechanics and uses knowledge of bug to skip content that lets them farm items faster, resulting in angry players and fewer users, which could have been avoided using better code.
  • 19. instancing and checkpoints 19 1. Players able to enter a different area (instance) to re- spawn bosses Player attacks the client and takes advantage of Game Mechanics and uses knowledge of bug to skip content that lets them farm items faster, resulting in angry players and fewer users, which could have been avoided using better code.
  • 21. buff/talent stacking 21 1. switching gear rapidly caused buffs or talents to “stack” allowing using talents to gain 1 shot kills, infinite money of headshots, etc. Player attacks the client and takes advantage of Game Mechanics and uses knowledge of bug to Gain In-game Currency and Enhance Gear, resulting in angry players and fewer users, which could have been avoided using better code.
  • 23. Current State 23 • Capturing as many bugs as possible • Categorizing them • Putting them into the framework
  • 26. Future State 26 • Moar Bugz (crowdsourced) • Continuous improvement of schema • Additional ideas for improvement
  • 27. Next Steps & Help 27 • If you know any game bugs, you can help out at this location: https://docs.google.com/spreadsheets/d/ 1Og08wyHsqtODBDkU_M2zHAvdxc63GSu-OmT8NjCc9Ak/ edit#gid=0 • We also just started a Slack channel, in case you don’t already have enough of those.
  • 28. Thanks & Contact 28 • Jason Haddix
 Bugcrowd
 
 @jhaddix • Daniel Miessler
 IOActive
 
 @danielmiessler https://www.owasp.org/index.php/ OWASP_Game_Security_Framework_Project