![]() ![]() Be sure to check that post out for specific recommendations on how to protect against this sort of vulnerability. Unity has also published their own blog post on this subject, they’ve been great to work with and continue to make moves internally to maximize the security of their platform. How game developers can mitigate the risk.Five possible ways an attacker might use a malicious GameObject to compromise a Unity game.Two ways I found that GameObjects (a non-code asset type) can be crafted to cause arbitrary code to run.Something that we’re seeing more of is hacking virtual reality systems and mass scale video games so we had a chance to do some research and came up with a bit of a novel approach which may allow attacking Unity-powered games and game devs. ![]() At IncludeSec our clients are asking us to hack on all sorts of crazy applications from mass scale web systems to IoT devices and low-level firmware. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |