Analysis of Anti-Hacking Software PunkBuster: How to Stop Cheating in Online Games David Nichols.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Online Game Security - Quake III and its Hacks - (related paper: A Systematic Classification of Cheating in Online Games, Jeff Yanand and Brian Randell.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Remote Desktop Connection Techniques Wireless Communication Networks.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
K. Salah1 Security Protocols in the Internet IPSec.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Authentication Approaches over Internet Jia Li
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Hands-On Microsoft Windows Server 2008
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Install, configure and test ICT Networks
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
K. Salah1 Security Protocols in the Internet IPSec.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 5 Electronic Commerce | Security Threats - Solution
Common Methods Used to Commit Computer Crimes
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Outline What does the OS protect? Authentication for operating systems
Chapter 5 Electronic Commerce | Security Threats - Solution
Introduction to Networking
Firewalls.
Outline What does the OS protect? Authentication for operating systems
Security in Networking
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Analysis of Anti-Hacking Software PunkBuster: How to Stop Cheating in Online Games David Nichols

Background Online gaming has readily increased in popularity over the past decade, becoming one of the most popular forms of gaming today With this increase in popularity the need for security has grown, as the player base becomes more and more diverse Proper network security has become essential ▫Not only to prevent cheating ▫But also to protect users personal information Debate has risen over who should provide security ▫Publishers, Users, or Third Parties

Design Decisions When designing a online game the publishers must choose between a number of trade offs ▫Efficiency and Accessibility vs. Security ▫Secure private servers vs. P2P As both technological and economic have evolved so has game design ▫Shift from privately hosted servers to public P2P models  Significantly cheaper and more expandable

P2P Network Design Host (client or admin) Client

Popular Security Mechanisms Checksums ▫Check client data for integrity via checksums  Can be forged Check client data against game rules ▫Many cheats can be sent within the rules Unique Database Structures Admins/Game Managers These security measures don’t stop many types of attacks

How Cheating Works Most of these cheats are based on weaknesses in the client-server model ▫Clients and even admins can’t be trusted Changes to the game code ▫Game code generally in binary  Can be decoded  Data files not in binary ▫Can change software (wallhack) or game state in memory (inf. ammo) Outside programs performing game actions ▫Turbo function and action scripts Modify personal computer’s system software ▫Change graphics driver to render all objects Packet Manipulation ▫Change packets being sent out (aimbot) ▫Use private data from client packets (wallhack) ▫Delay packets (slow time or retroactively act)

Two Main Types of Cheating Computer based attacksImproper Usage Aimbot ▫Use client info to aim ▫Modify code for dmg Artificial lag/Flood attacks ▫Attack physical device Look-ahead ▫Forge time stamp Physics hacking ▫Remove collision detection Altering game elements ▫Server override or impersonation Extrasensory perception ▫Display client info on screen Turbo Environmental exploits Ghosting Improper settings Scripting Collaboration

PunkBuster Created and first implemented in 2000 by Tony Ray to stop cheating in Castle Wolfenstein ▫Owned by Even Balance, Inc. ▫Subsequently used in numerous online shooters ▫Built around client-server model Installed on both clients and servers ▫Constantly communicates with Even Balance’s master servers Designed to scan for cheating computers and then ban them from protected servers/games

PunkBuster’s Implementation Each admin server requires its own unique directory Two main components of PunkBuster: ▫PunkBuster Server (runs on game servers)  password protected ▫PunkBuster Client (runs on players' playing machines while they play the game) If admin PB not up-to-date all players notified ▫If client PB not up-to-date player not allowed to join Frequent status reports (encrypted) are sent to the PunkBuster Server by all players Violations cause player to be kicked and all others notified Admins can manually kick players ▫For a specific number of minutes or permanently ▫Can be bypassed by altering time stamp Player power facility – allows games to run without admin

PunkBuster’s Security Features Real-time memory scanning ▫Uses Windows API functions and heuristic searches Communicates over games internet connection ▫To avoid firewall ▫Uses UDP ports to communicate “Throttled two-tiered background auto-update system” with master servers ▫Provide end-user security ▫Ensure no corrupted or false updates on user PC  Guarantees update integrity ▫Uses digital signatures provided by Verisign (Authenticode) ▫Updates validated by master servers based on security info  Prevents Admins from using PB to send viruses

PunkBuster’s Security Features Can request partial MD5 hashes of files inside the game installation directory ▫Results compared against a default config  Calculate differences and ban if necessary Admin search functions ▫To check player’s key bindings and scripts for cheats Stream PB server logs to other locations ▫Allows for the creation of universal “banned lists” Random player settings checks ▫Cvar checking  A number that represents game settings, must be in admin’s range

PunkBuster’s Security Features User Authentication ▫Use digital signatures ▫Happens continuously through game (2-3 per minute minimum) Screenshot Requests ▫Admin can request screenshot samples from players  Or can be done randomly  Can block screenshots (black screen) or erase visible hacking ▫Reflected in RecentSS value, visible to all players, prevents admins from cheating Hardware bans ▫Ban hardware components used to circumvent PB  Uses hard drive ID and other undisclosed components ▫Use multiple private one-ways hashes in order to protect the confidentiality of users serial number info Use GUID (Globally Unique Identifier) to ID users ▫Based on game installation ▫128 bit one-way hash generated from CD-key ▫Encrypted GUID bans

Attacks on PunkBuster Battlefield 3 – “Game discontented you were kicked by PunkBuster” error ▫Attackers used GUID scanner to duplicates of user’s GUID ▫Used security loophole to ban players IRC mass false positives ▫Because PB scans all virtual memory, attackers uploaded text fragments from cheat programs on popular IRC channels ▫PB would see malicious text in channel clients’ text buffers and ban them Incompatibility issues with: ▫Steam, non-windows admins, 64-bit clients, and some Firewalls

Criticisms Heavily uses user’s network, causing lag ▫Hogs bandwidth Puts heavy pressure on user’s PC processors ▫Slowing down or overheating some PCs Even Balance, the company, has too much power ▫“Judge, Jury, and Executioner”  Permanent bans based solely on their digression, not controlled by publishers Invasion of privacy ▫Screenshots, program lists, memory scans, hardware info, IP addresses, and other personal security info Still doesn’t stop all cheating/attacks