Exploiting Online Games: Cheating Massively Distributed Systems (Paperback)
暫譯: 利用線上遊戲:破解大規模分散系統

Greg Hoglund, Gary McGraw

  • 出版商: Addison Wesley
  • 出版日期: 2007-07-01
  • 售價: $1,730
  • 貴賓價: 9.5$1,644
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Paperback
  • ISBN: 0132271915
  • ISBN-13: 9780132271912
  • 立即出貨 (庫存=1)

買這商品的人也買了...

商品描述

Description

"Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first.

"The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It's their only hope of staying only one step behind the bad guys."

--Aviel D. Rubin, Ph.D.
Professor, Computer Science
Technical Director, Information Security Institute
Johns Hopkins University

"Everyone's talking about virtual worlds. But no one's talking about virtual-world security. Greg Hoglund and Gary McGraw are the perfect pair to show just how vulnerable these online games can be."

--Cade Metz
Senior Editor

PC Magazine

"If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. Or as the authors of this book might say, when you're facing off against Heinous Demons of Insecurity, you need experienced companions, not to mention a Vorpal Sword of Security Knowledge."

--Edward W. Felten, Ph.D.
Professor of Computer Science and Public Affairs
Director, Center for Information Technology Policy
Princeton University

"Historically, games have been used by warfighters to develop new capabilities and to hone existing skills--especially in the Air Force. The authors turn this simple concept on itself, making games themselves the subject and target of the 'hacking game,' and along the way creating a masterly publication that is as meaningful to the gamer as it is to the serious security system professional.

"Massively distributed systems will define the software field of play for at least the next quarter century. Understanding how they work is important, but understanding how they can be manipulated is essential for the security professional. This book provides the cornerstone for that knowledge."

--Daniel McGarvey
Chief, Information Protection Directorate
United States Air Force

"Like a lot of kids, Gary and I came to computing (and later to computer security) through games. At first, we were fascinated with playing games on our Apple ][s, but then became bored with the few games we could afford. We tried copying each other's games, but ran up against copy-protection schemes. So we set out to understand those schemes and how they could be defeated. Pretty quickly, we realized that it was a lot more fun to disassemble and work around the protections in a game than it was to play it.

"With the thriving economies of today's online games, people not only have the classic hacker's motivation to understand and bypass the security of games, but also the criminal motivation of cold, hard cash. That's a combination that's hard to stop. The first step, taken by this book, is revealing the techniques that are being used today."

--Greg Morrisett, Ph.D.
Allen B. Cutting Professor of Computer Science
School of Engineering and Applied Sciences
Harvard University

"If you're playing online games today and you don't understand security, you're at a real disadvantage. If you're designing the massive distributed systems of tomorrow and you don't learn from games, you're just plain sunk."

--Brian Chess, Ph.D.
Founder/Chief Scientist, Fortify Software
Coauthor of
Secure Programming with Static Analysis

"This book offers up a fascinating tour of the battle for software security on a whole new front: attacking an online game. Newcomers will find it incredibly eye opening and even veterans of the field will enjoy some of the same old programming mistakes given brilliant new light in a way that only massively-multiplayer-supermega-blow-em-up games can deliver. w00t!"

--Pravir Chandra
Principal Consultant, Cigital
Coauthor of
Network Security with OpenSSL

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft and Second Life®. This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks.

This book covers

  • Why online games are a harbinger of software security issues to come
  • How millions of gamers have created billion-dollar virtual economies
  • How game companies invade personal privacy
  • Why some gamers cheat
  • Techniques for breaking online game security
  • How to build a bot to play a game for you
  • Methods for total conversion and advanced mods

Written by the world's foremost software security experts, this book takes a close look at security problems associated with advanced, massively distributed software. With hundreds of thousands of interacting users, today's online games are a bellwether of modern software. The kinds of attack and defense techniques described in Exploiting Online Games are tomorrow's security techniques on display today.


 

商品描述(中文翻譯)

**描述**

「想像一下,如果你從未研究過進攻就試圖在足球中防守,你將無法知道何時會有跑動、如何防守傳球路徑,也不知道何時該進行突襲。在計算機系統中,就像在足球一樣,防守者必須能夠像攻擊者一樣思考。我每學期在課堂上都會說,你不想成為最後一個攻擊自己系統的人——你應該是第一個。」

「世界正在迅速上線。雖然我對網上投票持謹慎態度,但顯然網上遊戲正在席捲互聯網。在這個虛擬物品擁有真實美元價值的時代,財富在不存在的物品上贏得和失去,對勇敢的玩家來說,新威脅是非常真實的。為了防範這些危險,你必須了解它們,而這本開創性的書籍是唯一全面的信息來源,告訴你如何利用計算機遊戲。每位白帽駭客都應該閱讀它。這是他們唯一的希望,能夠始終比壞人快一步。」

——Aviel D. Rubin, Ph.D.
計算機科學教授
約翰霍普金斯大學資訊安全研究所技術主任

「每個人都在談論虛擬世界,但沒有人在談論虛擬世界的安全性。Greg Hoglund 和 Gary McGraw 是展示這些在線遊戲有多脆弱的完美搭檔。」

——Cade Metz
高級編輯
PC Magazine

「如果我們要改善安全實踐,這本書中的坦誠討論是唯一的前進之路。或者正如這本書的作者所說,當你面對可怕的不安全惡魔時,你需要經驗豐富的夥伴,更不用說一把安全知識的無敵劍。」

——Edward W. Felten, Ph.D.
計算機科學與公共事務教授
普林斯頓大學資訊技術政策中心主任

「歷史上,遊戲一直被戰鬥人員用來發展新能力和磨練現有技能——尤其是在空軍。作者將這一簡單概念反轉,使遊戲本身成為「駭客遊戲」的主題和目標,並在此過程中創造出一部對玩家和嚴肅的安全系統專業人士都意義深遠的出版物。」

「大規模分佈系統將定義未來至少二十五年的軟體領域。了解它們的運作方式很重要,但了解它們如何被操控對於安全專業人士來說是必不可少的。這本書提供了這方面知識的基石。」

——Daniel McGarvey
美國空軍資訊保護局局長

「像許多孩子一樣,Gary 和我通過遊戲進入了計算機(後來是計算機安全)。起初,我們對在 Apple ][ 上玩遊戲感到著迷,但隨著能負擔的遊戲越來越少,我們開始感到無聊。我們試著複製彼此的遊戲,但遇到了複製保護機制。因此,我們著手了解這些機制以及如何擊敗它們。我們很快意識到,拆解和繞過遊戲中的保護比玩遊戲有趣得多。」

「隨著當今在線遊戲繁榮的經濟,人們不僅擁有經典駭客的動機去理解和繞過遊戲的安全性,還有冷酷現實的金錢動機。這是一個難以阻止的組合。本書的第一步是揭示當前使用的技術。」

——Greg Morrisett, Ph.D.
哈佛大學計算機科學艾倫·B·卡廷教授
工程與應用科學學院

「如果你今天在玩在線遊戲而不理解安全性,你將處於真正的劣勢。如果你正在設計明天的大規模分佈系統而不從遊戲中學習,你將會完全失敗。」

——Brian Chess, Ph.D.
Fortify Software 創始人/首席科學家
《靜態分析的安全編程》共同作者

「這本書提供了一個引人入勝的旅程,探索在全新戰場上爭奪軟體安全的戰鬥:攻擊在線遊戲。新手會發現這本書令人耳目一新,即使是該領域的老手也會欣賞一些舊有的編程錯誤在這裡以全新的方式呈現,這是只有大規模多人超級爆破遊戲才能提供的。w00t!」

——Pravir Chandra
Cigital 首席顧問
《使用 OpenSSL 的網路安全》共同作者

如果你是一名玩家、一名遊戲開發者、一名軟體安全專業人士或一名感興趣的旁觀者,這本書揭示了在線遊戲安全的內部運作,讓所有人都能看到。

這本書由暢銷書《利用軟體》的作者撰寫,《**利用在線遊戲**》坦誠地探討了圍繞 MMORPG(如《魔獸世界™》和《第二人生®》)的爭議性安全問題。這本毫不保留的書籍配備了完整的代碼示例、除錯工具、機器人和破解技術。

本書涵蓋的內容包括:

- 為什麼在線遊戲是未來軟體安全問題的預兆
- 數百萬玩家如何創造出十億美元的虛擬經濟
- 遊戲公司如何侵犯個人隱私
- 為什麼一些玩家會作弊
- 破解在線遊戲安全的技術
- 如何建立一個機器人為你玩遊戲
- 完全轉換和高級模組的方法

這本書由世界頂尖的軟體安全專家撰寫,深入探討與先進的大規模分佈軟體相關的安全問題。隨著數十萬用戶的互動,當今的在線遊戲是現代軟體的風向標。《**利用在線遊戲**》中描述的攻擊和防禦技術是明天的安全技術,今天就已經展現出來。