Exploiting Online Games: Cheating massively distributed systems



Similar documents
Attack Trends software security? Gary McGraw, Ph.D. Chief Technology Officer, Cigital Cigital

Cyber Security: Software Risk Management for Utilities

Software Security Touchpoint: Architectural Risk Analysis

Scaling a Software Security Initiative: Lessons from the BSIMM

Royal Holloway University of London

Software Security Testing: Seeking security in an insecure world

Malware: Malicious Code

Full System Emulation:

Windows Operating Systems. Basic Security

Operating System Security

Viruses, Worms, and Trojan Horses

GlobalSign Malware Monitoring

Automated Software Testing by: Eli Janssen

Malware Trend Report, Q April May June

7 Reasons Why Your Business Should Adopt ACT365

A Systems Engineering Approach to Developing Cyber Security Professionals

From Lab to Factory: The Big Data Management Workbook

FORBIDDEN - Ethical Hacking Workshop Duration

Social Media Tips for Small Businesses

These Retail Specific Programs Are Guaranteed To Be A Hit With Your Group!

WHITE PAPER. Understanding How File Size Affects Malware Detection

TesT AuTomATion Best Practices

Threat Events: Software Attacks (cont.)

Demand, Supply, and Market Equilibrium

PRODUCTION. 1The Surplus

10 reasons why you need social science

Currency and Exchange Rates

Saving Money. Grade One. Overview. Prerequisite Skills. Lesson Objectives. Materials List

Netsweeper Whitepaper

Why Your Business Needs a Website: Ten Reasons. Contact Us: Info@intensiveonlinemarketers.com

Introduction to Penetration Testing Graham Weston

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Chapter 1 Basic Introduction to Computers. Discovering Computers Your Interactive Guide to the Digital World

AR State PIRC/ Center for Effective Parenting

White Paper - Crypto Virus. A guide to protecting your IT

Student Tech Security Training. ITS Security Office

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

ZNetLive Malware Monitoring

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Korea s experience of massive DDoS attacks from Botnet

Application Intrusion Detection

Topic 1 Lesson 1: Importance of network security

THE LITTLE BIG BOOK OF BADNESS

5 Steps to Advanced Threat Protection

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Massive multiplayer online games

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Barter vs. Money. Grade One. Overview. Prerequisite Skills. Lesson Objectives. Materials List

Boston University Security Awareness. What you need to know to keep information safe and secure

Lessons Learned in Software Testing

LESSON 1 BEING A HACKER

Introduction: 1. Daily 360 Website Scanning for Malware

Hacking Database for Owning your Data

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION

Ten Ways Small Businesses Can Minimize Computer Headaches And Lower Their IT Costs Without Sacrificing Performance

Dedicated server executable Log file of this server. (Located in your Windows user folder)

Reducing Application Vulnerabilities by Security Engineering

The Economics of. Software as a Service (SaaS) VS. Software as a Product. By Scott Sehlhorst

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Easy Casino Profits. Congratulations!!

Evaluating the Perceptions of People towards Online Security

Click on a link below for additional information.

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Topic 4: Different approaches to GDP

Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions

Technical Description Web Security Contest

7 AGGREGATE SUPPLY AND AGGREGATE DEMAND* Chapter. Key Concepts

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Ubuntu Linux Reza Ghaffaripour May 2008

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Loophole+ with Ethical Hacking and Penetration Testing

Banquet with Simon. (Luke 7:36-50) Keep these tips in mind as you welcome kids to the workshop and explore the story together.

What Do You Mean My Cloud Data Isn t Secure?

What you need to know to keep your computer safe on the Internet

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

x64 Servers: Do you want 64 or 32 bit apps with that server?

A Study on the Security aspects of Network System Using Penetration Testing

Software, Shareware and Opensource CSCU9B2

You are granted free resale rights of this ebook. You can resell this ebook for as

Locked Shields Kaur Kasak 24 Sept 2013

hp calculators HP 17bII+ Net Present Value and Internal Rate of Return Cash Flow Zero A Series of Cash Flows What Net Present Value Is

Transcription:

Exploiting Online Games: Cheating massively distributed systems Gary McGraw, Ph.D. CTO, Cigital http://www.cigital.com

Cigital Founded in 1992 to provide software security and software quality professional services Recognized experts in software security and software quality Widely published in books, white papers, and articles Industry thought leaders Consultants to EA

Disclaimer In our research for this book and this presentation we have broken no laws. We expect our readers likewise not to break the law using the techniques we describe.

Why online games?

Online games are a bellwether Online games (like World of Warcraft) have up to 900,000 simultaneous users on six continents 10,000,000 people subscribe to WoW 16,000,000+ play MMORPGs Clients and servers are massively distributed Time and state errors are rampant MMORPGs push the limits of software technology Modern distributed systems in other domains are evolving toward similar models SOA, Web 2.0 Time and state errors are the XSS of tomorrow

Online games are big business One game (WoW) has over 10,000,000 subscribers $14 * 10M = 140M * 12 = $1.68B (not to mention buying the client) A healthy middle market exists for pretend stuff Cheating pays off

Why pick on World of Warcraft?

1995 Dan Farmer fired from Silicon Graphics for releasing SATAN with Wietse Venema FUD: possible attack tool! Isn t this exploit discussion bad? Fall 2004 John Aycock at University of Calgary publicly criticized for malware course FUD: possible bad guy factory 2009 Any system administrator not using a port scanner to check security posture runs the risk of being fired Should we talk about attacking systems?

The good news and the bad news Good news The world loves to talk about how stuff breaks This kind of work sparks lots of interest in computer security Bad news The world would rather not focus on how to build stuff that does not break It s harder to build good stuff than to break junky stuff

Lawyers, guns, and money

Lawyers Game law is set up to counter piracy (not cheating) Cracking a game costs game companies big money Security mechanisms protect against cracking Online components answered this problem wholly The DMCA is now being used to counter cheating as well End User License Agreements (EULAs) and Terms of Use (TOU) lay out license obligations WoW Glider case Ginko Financial disappears Click to agree

Egregious EULAs Sony s EULA allows installation of a rootkit on your machine Blizzard s EULA allows monitoring The Warden Microsoft s Frontpage disallows negative comments about Microsoft EULAs for viruses allow (legal) propagation! The Governor Apple s EULA never dies Spyware or security mechanism? Gator s EULA disallows removal of the software

Guns

Money Exchange rates exist between in-game currency and real money Per capita GDP in some MMO worlds is greater than the per capita GDP of some real countries Economists study game economies Microsoft reports that the market in 2005 was over $6B DFC says the market will double to $12B by 2010 Secondary markets are also thriving In 10/2005 a player paid $100,000 for virtual stuff (an Asteroid Space Resort in Project Entropia) IGE has over 420 employees and project a $7B market by 2009 Connections to thottbot (for better sweat shop work) Chinese sweat shops make economic sense Second Life is set up as a market in virtual stuff (and players own their creations)

In China, over a half-million people farm MMO games Some sleep on cots near the computers and work in shifts People choose this job. It can be better than working on your dad s state-owned farm Almost anyone can get this job, even unskilled labor It s easier than making shoes! http://youtube.com/watch?v=ho5yxe6uvv4

Bugs, bots, and kung fu

Two kinds of cheating Exploits - actual game bugs, which are exploited to Teleport Duplicate items or gold See stuff you re not supposed to see Bots Both AFK and non-afk Only performing legal inputs, but in an automated fashion

Botting Botting happens because Grinding is really boring Players are farming Running the game to farm a resource, possibly running multiple accounts at once Farming bots are common Aimbots are a different story FPS hacks PvP combat bots help too For use in RPG combat How botting happens MACRO s & Scripts (most common) Memory read & write DLL Injection Debugging

Inject keystrokes and mouse movement Sample pixels and read memory locations Take over the GUI Must dedicate the computer to this Error prone Screen and controls must be preconfigured exactly as required ACTool, AutoHotKey, AutoIt3.0, LTool-0.3, xautomation Example: WoW_Agro Macro (in chapter 2) MACROs

Read & Write memory data Coordinates Speed Direction Use with a MACRO Read data directly (instead of sampling pixels) Build fresh sploits Map hacks Teleporting Speed hacks Process manipulation

Thread hijacking Hijack main system thread Eliminates thread safety issues Call internal functions within game client directly Minimize the game program Runs itself Doesn t have errors in sampling Eliminates need for MACRO altogether

Thread hijacking Used in a few WoW botting programs WoW.EXE MAIN THREAD INJECTED DLL RenderWorld(..) DETOUR PATCH Loops hundreds of times per second

Techniques for cheating Over the game (control the GUI) keystrokes mouse dropping pixel sampling In the game (manipulating objects) memory manipulation finding objects (automatically) Under the game 3D teleporting DLL injection be the graphics card Outside the game sniffing crypto cracking kernel fu

Total conversion and mod ing Replace graphics with new graphics Replace client logic

Advanced game hacking fu See Hacking World of Warcraft: An exercise in advanced rootkit development Greg Hoglund s presentation from Black Hat 2006 http://www.rootkit.com/vault/hoglund/ GregSlidesWoWHack.rar

State of the art Combine injected payload with cloaking and thread hijacking to FORCE in-game events Spell casting Movement Chat Acquire and clear targets Loot inventory

super MAIN THREAD RenderWorld(..) HARDWARE BP uncloak INJECTED CODE PAGE MAIN THREAD branch CastSpellByID(.. ) ScriptExecute(.. ) ClearTarget(.. ) complete MSG MAIN THREAD RenderWorld(..) restore recloak

Classic arms race

Breaking stuff is important Learning how to think like an attacker is essential Do not shy away from discussing attacks Engineers learn from stories of failure Attacking class projects is also useful!

Solving the problem: Software Security

Three pillars of software security Risk management framework Touchpoints Knowledge

Software security touchpoints

Using BSIMM BSIMM released March 2009 under creative commons http://bsi-mm.com steal the data if you want BSIMM is a yardstick Use it to see where you stand Use it to figure out what your peers do BSIMM is growing More BSIMM victims (9+17 and counting) BSIMM Europe BSIMM Begin Statistics Correlations

Where to Learn More

informit & Justice League www.informit.com No-nonsense monthly security column by Gary McGraw www.cigital.com/justiceleague In-depth thought leadership blog from the Cigital Principals Scott Matsumoto Gary McGraw Sammy Migues Craig Miller John Steven

IEEE Security & Privacy Magazine + 2 Podcasts Building Security In Software Security Best Practices column edited by John Steven www.computer.org/security/bsisub/ www.cigital.com/silverbullet www.cigital.com/realitycheck

Exploiting Online Games: the book Cheating massively distributed systems Sploits, hacks, mods Key lessons for other software Part of the Addison-Wesley Software Security Series AVAILABLE NOW

Cigital s Software Security Group invents and delivers software security See the Addison-Wesley Software Security series Send e-mail: gem@cigital.com For more If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. -Ed Felten Princeton