• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Reviews / Book Review: Exploiting Online Games

Book Review: Exploiting Online Games

2009-07-27 by Jason

Exploiting Online Games is the third book in series of titles by Greg Hoglund and Gary McGraw. Their two other books have previously been reviewed here at 404 Tech Support – Exploiting Software: How to Break Code and Rootkits: Subverting the Windows Kernel. These titles typically provide information for developers to take into consideration in their projects and for IT Professionals to use in their analysis of securing their environment. I am primarily reading these books for the latter reason and approach these reviews with that perspective.

Exploiting Online Games covers a variety of topics: the basics of online gaming and hacking, playing for profit, End User License Agreements, bugs in games, hacking game clients, bots, reverse engineering, modding, and security points for game developers. The basics explains some common terminology and clarifies the different types of online games including FPS (first-person shooters), MMORPGs (Massively Multiplayer Online Role Playing Games), and virtual worlds (like Second Life).


I picked up this book in the first place for two reasons; I had read and learned from the other two books and Second Life has been quite an issue of contention at work. I will not waste any breath (err… keystrokes) on repeating the arguments either way, but I deemed being aware of any possible risks from this insisted upon software to be a work responsibility of mine.

I am no stranger to online games (noob) as you might catch me on Team Fortress 2 a decent amount of time. I am well aware of MMORPGs and overhear many a-conversations about them, although I haven’t played one myself. That might change however with Champions Online or the DC Universe Online MMORPGs coming out as comic book heroes are a particular weakness of mine. Back to the book, that familiarity with games made the first few chapters feel very basic and even a little dated, though the book was only copyrighted in 2008.

Once you get into the meat of the book, it starts to get interesting. They discuss hacking clients a variety of ways such as changing the code of a client or intercepting and replacing the packets of network traffic on their way to and from the game client. There are is also discussion and examples of using and building a bot. The next section of the books dives deep into reverse engineering clients or servers and how this would apply to online gaming. They then branch off to briefly explain how it would apply to traditional software using the same client-server model.

The final topic in Exploiting Online Games is security pointers when it comes to online games. The majority of the final chapter is for online game developers but it also provides a quick checklist of security questions everyday gamers should be asking themselves. In the end, though, it still concludes like all software, is the security risk and the means to prevent it acceptable to you as a user/gamer.

To summarize, I think the Exploiting Online Games could have simply been an appendix to the Exploiting Software book as it follows along the same vein and many of the pages here are spent repeating the lessons learned in Exploiting Software. The main difference with online games is that you now have that same exploitable software now networked to multiple, even hundreds of other computers either via P2P or through a central server, all enforcing a standard version. There are other issues to take into consideration like economics (being paid to play or reselling virtual items for real money) and the value of “cheating,” but mostly it felt like a lot of skimming would have garnered me the same amount information for my purposes after previously reading Exploiting Software.

Filed Under: Reviews, Security and Privacy

Trending

  • Eraser – Securely Delete Your Files
    In Media, Security and Privacy, Software
  • AVG’s Second Quarter Report Shows Malware Trends Across Multiple Platforms
    In Security and Privacy, Software
  • Making Setup.exe into Setup.msi
    In Software, System Administration, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Configure Outlook to recurring appointments for the last weekday of the month Configure Outlook to recurring appointments for the last weekday of the month
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
  • Benefits of End-To-End Testing That Will Match Company Expectations Benefits of End-To-End Testing That Will Match Company Expectations
  • 3 Key Features of Pets Health Monitoring Systems 3 Key Features of Pets Health Monitoring Systems
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in