×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Exploiting Online Games: Cheating Massively Distributed Systems / Edition 1
     

Exploiting Online Games: Cheating Massively Distributed Systems / Edition 1

by Greg Hoglund
 

See All Formats & Editions

ISBN-10: 0132271915

ISBN-13: 2900132271911

Pub. Date: 07/23/2007

Publisher: Addison-Wesley

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of

Overview

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft and Second Life. This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks.

This book covers
-Why online games are a harbinger of software security issues to come
-How millions of gamers have created billion-dollar virtual economies
-How game companies invade personal privacy
-Why some gamers cheat
-Techniques for breaking online game security
-How to build a bot to play a game for you
-Methods for total conversion and advanced mods

Written by the world's foremost software security experts, this book takes a close look at security problems associated with advanced, massively distributed software. With hundreds of thousands of interacting users, today's online games are a bellwether of modern software. The kinds of attack and defense techniques described in Exploiting Online Games are tomorrow's security techniques on display today.

Product Details

ISBN-13:
2900132271911
Publisher:
Addison-Wesley
Publication date:
07/23/2007
Series:
Addison-Wesley Software Security Series
Edition description:
New Edition
Pages:
384

Table of Contents

Foreword xvii
Preface xxi

Why Are We Doing This? xxii
Where Do We Draw the Line? xxiii
What's in the Book? xxiv
The Software Security Series xxvi
Contacting the Authors xxvii

Acknowledgments xxix

Greg's Acknowledgments xxix
Gary's Acknowledgments xxix

About the Authors xxxiii

Chapter 1: Why Games? 3

Online Games Worldwide 5
The Lure of Cheating in MMORPGs 7
Games Are Software, Too 9
Hacking Games 12
The Big Lesson: Software as Achilles' Heel 17

Chapter 2: Game Hacking 101 19

Defeating Piracy by Going Online 20
Or Not . . . 20
Tricks and Techniques for Cheating 21
The Bot Parade 31
Lurking (Data Siphoning) 36
Tooling Up 39
Countermeasures 46

Chapter 3: Money 65

How Game Companies Make Money 65
Virtual Worlds: Game Economics and Economies 67
Criminal Activity 73

Chapter 4: Enter the Lawyers 75

Legality 75
Fair Use and Copyright Law 77
The Digital Millennium Copyright Act 78
The End User License Agreement 79
The Terms of Use 88
Stealing Software versus Game Hacking 89

Chapter 5: Infested with Bugs 93

Time and State Bugs in Games 95
Pathing Bugs in Games 104
Altering the User Interface 107
Modifying Client-Side Game Data 108
Monitoring Drops and Respawns 109
Just Show Up 111
And in Conclusion 111

Chapter 6: Hacking Game Clients 113

Malicious Software Testing (Enter the Attacker) 113
Countermeasures against Reverse Engineering 122
Data, Data, Everywhere 126
Getting All Around the Game 132
Going Over the Game: Controlling the User Interface 132
Getting In the Game: Manipulating Game Objects 139
Getting Under the Game: Manipulating Rendering Information 164
Standing Way Outside the Game: Manipulating Network Packets 179
The Ultimate in Stealth: Taking Client Manipulation to the Kernel 180
Clients Make Great Targets 183

Chapter 7: Building a Bot 185

Bot Design Fundamentals 186
Bot as Debugger 208
The Wowzer Botting Engine 224
Advanced Bot Topics 228
Bots for Everyone 244

Chapter 8: Reversing 247

Taking Games Apart 248
Code Patterns in Assembly 264
Self-Modifying Code and Packing 290
Reversing Concluded 291

Chapter 9: Advanced Game Hacking Fu 293

Conversions and Modding 293
Media File Formats 314
Emulation Servers (Private Servers) 315
Legal Tangles 319

Chapter 10: Software Security Über Alles 321

Building Security In for Game Developers 322
Security for Everyday Gamers 327
Exploiting Online Games 328

Index 331

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews