Online Game Security - Quake III and its Hacks - (related paper: A Systematic Classification of Cheating in Online Games, Jeff Yanand and Brian Randell.

Slides:



Advertisements
Similar presentations
12/13/2001CS 638, Fall 2001 Today Cheat prevention (and cheat techniques) –Great article:
Advertisements

Anti-Cheating Mechanisms for Computer Games Michael Rudolph Jason Cook.
Stopping cheaters since By: Tigran Gasparian.
Cheat-Proofing P2P Online-gaming Albert Lee Spring 2008 Comp 424.
Computer Games ► My hobby is computer games. I like playing online with my friends.
 Currently there is no software solution that combines video and animation in to one platform.  Every single change drag changes in all of the environments.
Operating System Customization
Trojan Horse Program Presented by : Lori Agrawal.
Discovering Computers: Chapter 1
CS 290C: Formal Models for Web Software Lecture 10: Language Based Modeling and Analysis of Navigation Errors Instructor: Tevfik Bultan.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Macromedia Dreamweaver 4 Advanced Level Course. Add Rollovers Rollovers or mouseovers are possibly the most popular effects used in designing Web pages.
CP1610: Introduction to Computer Components
Computer Basics Flashcards #2
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
MIS Week 7 Site:
Daniel Korycinski CIS 487.  Developer: Valve Corporation  Game Type: First Person Shooter (FPS)  Rated for a mature audience  Price: $19.95.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
eScan Total Security Suite with Cloud Security
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Types of Computers Desktop / Laptop PC / Mac Client / Server.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Operating Systems Operating System
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
© Cheltenham Computer Training 2001 Macromedia Dreamweaver 4 - Slide No 1 Macromedia Dreamweaver 4 Advanced Level Course.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Zhonghua Qu and Ovidiu Daescu December 24, 2009 University of Texas at Dallas.
ROM Read Only Memory “…computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only.
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
Online Game Trojan SecurityLabs.websense.com Hermes Li.
Final Presentation – CS 425 Aaron O'Banion Todd Astroth Chris Cobb Matt Stowe Mark Williams.
Device Drivers.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Emergency Notification System (CENS)
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
A Taxonomy of Online Game Attacks and Defenses Presentation Computer and Communication Security Laboratory Korea University.
A Space Game By William Sistar. The Problem What is provided:  Most network games are single player  Some do allow team work but not in a common environment.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
CS 592: Security Practicum Lecture 2 On-line PC games and their cheats.
Digital Literacy: Computer Basics
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Myrtle Entertainment System Scanner How to work your way to installing a program via Myrtle Entertainment System Scanner.
Agenda Last class: Computer Software Today: –Task Manager, Control Panel.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
FUNCTIONS OF THE COMPUTER.  A programmable machine that performs high-speed processing of numbers, as well as of text, graphics, symbols, and sound.
Analysis of Anti-Hacking Software PunkBuster: How to Stop Cheating in Online Games David Nichols.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
Booting Process Chapter 4: System Software Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer PARTS. What is hardware? The hardware are the parts of the computer itself including the Central Processing Unit (CPU), keyboards, monitors,
Information Systems Design and Development Security Precautions Computing Science.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Fight Game Brian Kessler.
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Chapter 6 System and Application Software
Firewalls Routers, Switches, Hubs VPNs
Radoslaw Jedynak, PhD Poland, Technical University of Radom
24/7/365 Remote Computer Support
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Presentation transcript:

Online Game Security - Quake III and its Hacks - (related paper: A Systematic Classification of Cheating in Online Games, Jeff Yanand and Brian Randell. Submitted 2004) A Systematic Classification of Cheating in Online GamesA Systematic Classification of Cheating in Online Games Speaker: S. F. Yeung

Flow of this Presentation What is Game Hacks? What is Game Hacks? How do Hacks Work? How do Hacks Work? What can Hacks Do? What can Hacks Do? How to Fight Against Them? How to Fight Against Them? How Hackers Fight back ? How Hackers Fight back ? So, What ’ s Now? So, What ’ s Now? Possible Solutions Possible Solutions

What is Game Hacks (or cheats)? A program that alters a game ’ s performance A program that alters a game ’ s performance Enhancing the abilities of the hacker (or cheater) Enhancing the abilities of the hacker (or cheater) Giving an unfair edge over the other players Giving an unfair edge over the other players

What Hacks can/cannot Do ? Hacks can Hacks can –Reveal hidden information on the client side –Assist your mouse/keyboard control –Enhance your visibility or remove unwanted visual effect Hack cannot Hack cannot –Reveal information not exist in client side –Alter the rules and logics of the game –Alter the performance of other players

How do Hacks Work? –Hard Coded Modify the game code Modify the game code –External Retrieve information from the game indirectly and alter the control of the game indirectly Retrieve information from the game indirectly and alter the control of the game indirectly –Driver Hack Modify the video driver to gain special visual effect Modify the video driver to gain special visual effect –Client Hook Inject code into the game ’ s memory in runtime Inject code into the game ’ s memory in runtime

How do Hacks Work? Hard Coded Hard Coded –Modify the game code directly and permanently –Easily to be blocked Game ServerGame Program DATA Hack

How do Hacks Work? External External –Reside outside the game program –Limited functionality Game ServerGame Program DATA Color Model Windows Mouse Control Hack Windows Graphic Display Interface

How do Hacks Work? Driver Hack Driver Hack –Modify the OpenGL driver so that objects (including walls) become semi-transparent –Difficult and dangerous to install Game ServerGame Program DATA Hacked Video Driver Display

How do Hacks Work? Client Hook Client Hook The most advanced and popular today The most advanced and popular today Inject code into the game ’ s memory in runtime Inject code into the game ’ s memory in runtime Alter and control the game directly in runtime Alter and control the game directly in runtime Game Server Client Hook DATA Game Running

What can Hacks Do ? Wall Hack Wall Hack –See other players through walls Aimbot (aiming robot) Aimbot (aiming robot) –Lock your crosshair on other players automatically Firebot (fire robot) Firebot (fire robot) –Fire your weapon automatically once your crosshair hover over another player ESP (extrasensory perception) ESP (extrasensory perception) –Reveal and display hidden information

What can Hacks Do ? Wall Hack Wall Hack –Driver Hack Make everything semi-transparent, you can see others through walls, but everything become semi- transparent may not be good somehow Make everything semi-transparent, you can see others through walls, but everything become semi- transparent may not be good somehow –Client Hook Only show certain objects through walls, very effective Only show certain objects through walls, very effective

Full transparency Partial transparency

What can Hacks Do ? Aimbot and Firebot Aimbot and Firebot –External Colored object model Colored object model Scan the screen to locate target Scan the screen to locate target Interfere your control via Windows message Interfere your control via Windows message Not very intelligent and inaccurate Not very intelligent and inaccurate –Client hook Access the game engine in memory, obtain target position and take over your control directly Access the game engine in memory, obtain target position and take over your control directly Perfect accuracy if low network latency Perfect accuracy if low network latency

Colored object model

What can Hacks Do ? ESP ESP –Client Hook Radar ESP and Map ESP Radar ESP and Map ESP –Shows the location of enemies Text ESP Text ESP –Shows other players ’ name, weapon, armor and other variables

ESP showing Enemies ’ name, weapon and their locations

How to Fight Against Hacks? Pure Server Environment Pure Server Environment –Server will check against all game files, players joining the server must have the same config file, object models, sound files, etc. –Effective against hard-coded hacks and external hacks

How to Fight Against Hacks? 3rd Party Anti-cheating Software 3rd Party Anti-cheating Software –For example: PunkBustered (Quake III, RTCW) PunkBustered (Quake III, RTCW) UT Pure (Unreal Tournament) UT Pure (Unreal Tournament) VAC (Counter Strike) VAC (Counter Strike) –Players must install the anti-cheating software in order to join a anti-cheating enabled server –Acts like a virus scanner –Auto updates with the new hack patterns –Capture and send screenshots regularly –Banns your serial number if any hack found

How Hackers Fight back? Anti-cheating Software Proof Hacks Anti-cheating Software Proof Hacks –Cracks the anti-cheating software binary –Alters the behavior of the anti-cheating software –Automatically disable the hacks each time the anti-cheating software takes a screen shot

So, What ’ s Now? An update competition An update competition –Most hacks will be banned several days after public release –Major hacks will have new version few weeks after the previous one get banned

Possible Solutions Use secure network protocol Use secure network protocol –Add checksum between every packets, makes insertion or modification of packets difficult Encrypt all important variables Encrypt all important variables –Encrypt variables so that cheats cannot reveal information from the memory Push all computation to the server side Push all computation to the server side –The client side only responsible for user input and display rendering thus the cheats have no way to alter the state or outcome of the game

THE END