Mobile game server hack? : hacking

*
Hacking is an incredibly misunderstood term. The truyền thông media has portrayed the practice at one of two extremes — either a hacker is a hooded, mysterious “anti-hero” fighting the big bad evil of corporatocracy, or a stereotypically capricious counter-culture hero shouting “haông chồng the planet”.

Bạn đang xem: Mobile game server hack? : hacking

The fact is that hacking is generally done for a single purpose — self reward, typically driven by sighting obvious vulnerabilities. Whether this means a system is broken lớn steal credit thẻ numbers or to simply develop a tool that a developer has yet to develop internally, hacking is generally focused on self-reward.

Today, we’re going khổng lồ dissect one of the most commonly hacked industries in the world — Smartphone monetized gaming. We’ll discuss the common vulnerabilities inherent in these systems, how they are generally hacked, and how lớn prsự kiện this from occurring & disrupting a developer’s revenue stream.

Defining Hacking

First thing’s first — we need to lớn define hacking. The earliest hackers were termed so for their skills in “hacking apart” a machine or device. One of the pre-eminent hackers of the early community focusing on telephones, the “phreakers”, was John Draper, better known by his moniker “Captain Crunch”. The moniker was apt — he had the ability lớn use a whistle obtained from a Captain Crunch cereal box lớn whistle tones that would break the AT&T network. In one case, he

Though hacking took a decidedly darker turn as credit cards and banking took lớn giải pháp công nghệ, most modern hackers aren’t malicious. Keep in mind that throughout this piece, when we reference a hacker, that’s who we’re referencing — the sixteen or seventeen year old that does not lượt thích the “freemium” model of thiết bị di động gaming, who just wants a few hundred of the game’s nhái currency or to fool a timer restricting their progression.

With that in mind, however, we must make one thing clear — Nordic APIs does not condone hacking, and this piece is not to lớn be considered a guide lớn hacking or an inspiration therein. By exposing these methods, we hope to lớn give sầu API developers a look inlớn the mindmix of an API hacker in the gaming space, and the vulnerabilities that they typically look for.

Vulnerabilities of Gaming – Static vs điện thoại Gaming

What makes Mobile gaming so hackable? What makes it so attractive sầu to lớn break, và so easy to circumvent? To understvà that, we must first underst& the difference between static & di động gaming.

Xem thêm: Tải 7 Viên Ngọc Rồng: Lưỡng Long Nhất Thể Hack Kim Cương, Lậu

When we say static gaming, what we really mean is “home” gaming. This might include a console, a PC, or even an arcade cabinet in a bar or pizza joint. These devices are generally hard khổng lồ haông xã, & are thus not very attractive sầu khổng lồ the average hacker. Consoles are designed lớn not allow circumvention of anti-cheat systems or for homebrew software to run natively, and arcade games are typically in big, bulky cases, locked from the general public.

PCs are a little bit of a different story, as these devices allow for quite easy hacking for knowledgeable users, but require a very high cấp độ of knowledge & ability to lớn get around obfuscation, proprietary code, and so forth. For this reason, piracy is very popular on the PC, though the pirated releases are often quite delayed.

All of these static gaming situations have one thing in comtháng, however — they all handle processing internally. Think of Metal Gear Solid, Kerbal Space Program, or even older games like Tetris. With very few exceptions (typically in multiplayer games) games in static environments will carry out the data processing, đoạn Clip delivery, mechanics, etc. natively on the system on which it is installed. This means that the hacks, again with very limited exceptions, generally stay within the system with which it originated.

Mobile gaming is an entirely different story. Mobile gaming, by its very nature, is designed lớn work on lightweight platforms. Even though sản phẩm điện thoại devices have gotten much more powerful than ever before, the fact remains that processing, score ladders, & even in-game mechanics are often sent from the device lớn an external VPS, where the data is then processed, repackaged, & delivered for on-device handling.

This exposes a massive sầu security flaw that is not inherent in the static gaming world. Barring multiplayer functionality, all of the mechanics, progression systems, và so forth in static gaming can typically be handled off-line. While thiết bị di động games can still be played offline (as in the case of a game lượt thích Fallout Shelter), many games (including Clash of Clans & Candy Crush) depkết thúc on online functionality for the bulk of their gameplay.

Xem thêm: Quản Lý Danh Bạ Điện Thoại Bị Ẩn, Làm Thế Nào Để Lấy Lại Danh Bạ Iphone Bị Ẩn

In short, data must leave the device via an API, enter a VPS, leave sầu that hệ thống again, and return khổng lồ the device. This exchange creates three unique vulnerabilities that can lead khổng lồ effective hacking và breaking of API monetization schemes.


Chuyên mục: