HOME > 상세정보

상세정보

Exploiting online games : cheating massively distributed systems

Exploiting online games : cheating massively distributed systems (2회 대출)

자료유형
단행본
개인저자
Hoglund, Greg. McGraw, Gary , 1966-
서명 / 저자사항
Exploiting online games : cheating massively distributed systems / Greg Hoglund, Gary McGraw.
발행사항
Upper Saddle River, NJ :   Addison-Wesley ,   c2008.  
형태사항
xxxv, 340 p. : ill. ; 24 cm.
총서사항
Addison-Wesley software security series
ISBN
9780132271912 (pbk.) 0132271915 (pbk.)
일반주기
Includes bibliographical references and index.  
내용주기
Why games? -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bot -- Reversing -- Advanced game hacking fu -- Software security uber alles.
일반주제명
Computer networks -- Security measures.
000 01174camuu2200289 a 4500
001 000045414889
005 20080116163107
008 070503s2008 njua b 001 0 eng
010 ▼a 2007018716
020 ▼a 9780132271912 (pbk.)
020 ▼a 0132271915 (pbk.)
035 ▼a (KERIS)REF000013085746
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a TK5105.59 ▼b .H64 2008
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b H716ex
100 1 ▼a Hoglund, Greg.
245 1 0 ▼a Exploiting online games : ▼b cheating massively distributed systems / ▼c Greg Hoglund, Gary McGraw.
260 ▼a Upper Saddle River, NJ : ▼b Addison-Wesley , ▼c c2008.
300 ▼a xxxv, 340 p. : ▼b ill. ; ▼c 24 cm.
490 0 ▼a Addison-Wesley software security series
500 ▼a Includes bibliographical references and index.
505 0 ▼a Why games? -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bot -- Reversing -- Advanced game hacking fu -- Software security uber alles.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a McGraw, Gary , ▼d 1966-
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 H716ex 등록번호 121164024 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

"Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first.

"The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It's their only hope of staying only one step behind the bad guys."

--Aviel D. Rubin, Ph.D.
Professor, Computer Science
Technical Director, Information Security Institute
Johns Hopkins University

"Everyone's talking about virtual worlds. But no one's talking about virtual-world security. Greg Hoglund and Gary McGraw are the perfect pair to show just how vulnerable these online games can be."

--Cade Metz
Senior Editor

PC Magazine

"If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. Or as the authors of this book might say, when you're facing off against Heinous Demons of Insecurity, you need experienced companions, not to mention a Vorpal Sword of Security Knowledge."

--Edward W. Felten, Ph.D.
Professor of Computer Science and Public Affairs
Director, Center for Information Technology Policy
Princeton University

"Historically, games have been used by warfighters to develop new capabilities and to hone existing skills--especially in the Air Force. The authors turn this simple concept on itself, making games themselves the subject and target of the 'hacking game, ' and along the way creating a masterly publication that is as meaningful to the gamer as it is to the serious security system professional.

"Massively distributed systems will define the software field of play for at least the next quarter century. Understanding how they work is important, but understanding how they can be manipulated is essential for the security professional. This book provides the cornerstone for that knowledge."

--Daniel McGarvey
Chief, Information Protection Directorate
United States Air Force

"Like a lot of kids, Gary and I came to computing (and later to computer security) through games. At first, we were fascinated with playing games on our Apple ] s, but then became bored with the few games we could afford. We tried copying each other's games, but ran up against copy-protection schemes. So we set out to understand those schemes and how they could be defeated. Pretty quickly, we realized that it was a lot more fun to disassemble and work around the protections in a game than it was to play it.

"With the thriving economies of today's online games, people not only have the classic hacker's motivation to understand and bypass the security of games, but also the criminal motivation of cold, hard cash. That's a combination that's hard to stop. The first step, taken by this book, is revealing the techniques that are being used today."

--Greg Morrisett, Ph.D.
Allen B. Cutting Professor of Computer Science
School of Engineering and Applied Sciences
Harvard University

"If you're playing online games today and you don't understand security, you're at a real disadvantage. If you're designing the massive distributed systems of tomorrow and you don't learn from games, you're just plain sunk."

--Brian Chess, Ph.D.
Founder/Chief Scientist, Fortify Software
Coauthor of
Secure Programming with Static Analysis

"This book offers up a fascinating tour of the battle for software security on a whole new front: attacking an online game. Newcomers will find it incredibly eye opening and even veterans of the field will enjoy some of the same old programming mistakes given brilliant new light in a way that only massively-multiplayer-supermega-blow-em-up games can deliver. w00t "

--Pravir Chandra
Principal Consultant, Cigital
Coauthor of
Network Security with OpenSSL

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft(TM) and Second Life(R). This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks.

This book covers

  • Why online games are a harbinger of software security issues to come
  • How millions of gamers have created billion-dollar virtual economies
  • How game companies invade personal privacy
  • Why some gamers cheat
  • Techniques for breaking online game security
  • How to build a bot to play a game for you
  • Methods for total conversion and advanced mods

Written by the world's foremost software security experts, this book takes a close look at security problems associated with advanced, massively distributed software. With hundreds of thousands of interacting users, today's online games are a bellwether of modern software. The kinds of attack and defense techniques described in Exploiting Online Games are tomorrow's security techniques on display today.


정보제공 : Aladin

저자소개

그렉 호그룬드(지은이)

지난 십 년 간 소프트웨어 보안 영역의 선구자였다. Windows NT 기반의 루트킷을 만들고 문서화하였으며, 그 자료는 www.rotkit.com에서 찾아볼 수 있다.

게리 맥그로(지은이)

Cigital 사의 CTO이며, 소프트웨어와 응용프로그램 보안에 관한 세계적인 권위자다. <Java Security>와 <Building Secure Software>를 공동 집필하였으며, 대기업의 컨설턴트이고, 소프트웨어 보안에 대한 연구와 조언을 해주고 있다.

정보제공 : Aladin

목차

Foreword
Preface
Why Are We Doing This?
Where Do We Draw the Line?
What's in the Book?
The Software Security Series
Contacting the Authors
Acknowledgments
Greg's Acknowledgments
Gary's Acknowledgments
About the Authors


Chapter 1: Why Games?
Online Games Worldwide
The Lure of Cheating in MMORPGs
Games Are Software, Too
Hacking Games
The Big Lesson: Software as Achilles' Heel

Chapter 2: Game Hacking
Defeating Piracy by Going Online
Or Not . . .
Tricks and Techniques for Cheating
The Bot Parade
Lurking (Data Siphoning)
Tooling Up
Countermeasures

Chapter 3: Money
How Game Companies Make Money
VirtualWorlds: Game Economics and Economies
Criminal Activity

Chapter 4: Enter the Lawyers
Legality
Fair Use and Copyright Law
The Digital Millennium Copyright Act
The End User License Agreement
The Terms of Use
Stealing Software versus Game Hacking

Chapter 5: Infested with Bugs
Time and State Bugs in Games
Pathing Bugs in Games
Altering the User Interface
Modifying Client-Side Game Data
Monitoring Drops and Respawns
Just Show Up
And in Conclusion

Chapter 6: Hacking Game Clients
Malicious Software Testing (Enter the Attacker)
Countermeasures against Reverse Engineering
Data, Data, Everywhere
Getting All Around the Game
Going Over the Game: Controlling the User Interface
Getting In the Game: Manipulating Game Objects
Getting Under the Game: Manipulating Rendering Information?? ???
Standing Way Outside the Game: Manipulating Network Packets
The Ultimate in Stealth: Taking Client Manipulation to the Kernel
Clients Make Great Targets

Chapter 7: Building a Bot
Bot Design Fundamentals
Bot as Debugger
The Wowzer Botting Engine
Advanced Bot Topics
Bots for Everyone

Chapter 8: Reversing
Taking Games Apart
Code Patterns in Assembly
Self-Modifying Code and Packing
Reversing Concluded

Chapter 9: Advanced Game Hacking Fu
Conversions and Modding
Media File Formats
Emulation Servers (Private Servers)
Legal Tangles

Chapter 10: Software Security Uber Alles
Building Security In for Game Developers
Security for Everyday Gamers
Exploiting Online Games


Index


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)