Abstract
Currently on-line gaming represents a severe threat to the forensic community, as criminals have started to use on-line gaming as communication channels instead of traditional channels like WhatsApp or Facebook. In this paper, we describe a methodology developed after conducting an in-depth digital forensic analysis of the central artifacts of a popular video-game - Counter Strike Nexon Zombies video-game (Steam platform) - where valuable artifacts are those that related to the chatting features of the game. For our research we analyzed the network, volatile, and disk captures for two generated cases and focused on chat-feature inside and outside of the in-game rounds and the live chat done through YouTube Live Streaming. Our results provide the forensic community a complete guideline that can be used when dealing with a real criminal case in which there is a Steam video-game involved. Besides the forensic analysis, we found a security vulnerability (session hijacking) which was reported to the game manufacturer as soon it was discovered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This vulnerability was reported to Valve Corporation via email as soon as it was discovered.
- 2.
References
Anglano, C.: Forensic analysis of whatsapp messenger on android smartphones. Digital Invest. 11(3), 201–213
Bourne, W.: Youtube vs. twitch: how to make money live streaming (2018). https://goo.gl/cxafwX. Accessed 05 July 2018
Daniel, L.E.: Multiplayer game forensics (2018). https://www.forensicmag.com/article/2010/05/multiplayer-game-forensics. Accessed 02 Feb 2018
Davies, M., Read, H., Xynos, K., Sutherland, I.: Forensic analysis of a sony playstation 4: a first look. Digital Invest. 12, 81–89
Editor: Why online gaming is the new frontier for cybercrime (2015). https://www.welivesecurity.com/2015/12/24/online-gaming-new-frontier-cybercriminals/. Accessed 20 Jan 2018
Graff, G.M.: How a dorm room minecraft scam brought down the internet (2017). https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/. Accessed 20 Jan 2018
Grayson, N.: The counter-strike gambling scandal, explained. https://steamed.kotaku.com/why-people-are-flipping-out-over-the-counter-strike-gam-1783369102. Accessed 20 Jan 2018
Jhala, G.J.: Whatsapp forensics: decryption of encrypted whatsapp databases on non rooted android devices. J. Inf. Technol. Software Eng. 5(2), 1 (2015)
Karpisek, F., Baggili, I., Breitinger, F.: Whatsapp network forensics: decrypting and understanding the whatsapp call signaling messages. Digital Invest. 15, 110–118 (2015)
Khanji, S., Jabir, R., Iqbal, F., Marrington, A.: Forensic analysis of xbox one and playstation 4 gaming consoles. Digital Invest. 12, 81–89 (2016)
Lofgren, K.: Video game trends and statistics - who’s playing what and why? (2017). https://goo.gl/9CeDFb. Accessed 20 Jan 2018
Mastroianni, B.: How terrorists could use video games to communicate undetected (2015). https://goo.gl/F5Jvnb. Accessed 20 Jan 2018
McKemmish, R.: What is Forensic Computing?. Australian Institute of Criminlogy, Canberra (1999). Art 118
McQuaid, J.: Skype Forensics: Analyzing Call and Chat Data from Computers and Mobile. MAGNET Forensics, Herndon (2014)
Moore, J., Baggili, I., Marrington, A., Rodrigues, A.: Preliminary forensic analysis of the xbox one. Digital Invest. 11, S57–S65 (2014)
NETRESEC: Networkminer. http://www.netresec.com/?page=NetworkMiner, http://www.netresec.com/. Accessed 02 Feb 2018
NirSoft.: Chromecacheview. https://www.nirsoft.net/utils/chrome_cache_view.html. Accessed 02 May 2018
NirSoft: Jumplistview. https://www.nirsoft.net/utils/jump_lists_view.html. Accessed 02 May 2018
Sgaras, C., Kechadi, M.-T., Le-Khac, N.-A.: Forensics acquisition and analysis of instant messaging and VoIP applications. In: Garain, U., Shafait, F. (eds.) IWCF 2012/2014. LNCS, vol. 8915, pp. 188–199. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20125-2_16
Smith, C.: 34 interesting steam statistics and facts (2018). https://expandedramblings.com/index.php/steam-statistics/. Accessed 02 May 2018
Wireshark: About wireshark. https://www.wireshark.org/. Accessed 02 Feb 2018
Wong, K., Lai, A.C.T., Yeung, J.C.K., Lee, W.L., Chan, P.H.: Facebook Forensics, pp. 1–24. Valkyrie-X Security Research Group, Singapore (2013)
Acknowledgments
This work has been supported by the CAM grant S2013/ICE-3095 (CIBERDINE: Cybersecurity, Data, and Risks) and by the MINECO grant TIN2016-79095-C2-2-R (SMOG-DEV—Security mechanisms for fog computing: advanced security for devices).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A List of Tools and Evidences
Appendix B Workflows of Case 1 and 2
Appendix C Primary Artifacts
Appendix D Summary of Cases Results
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Tabuyo-Benito, R., Bahsi, H., Peris-Lopez, P. (2019). Forensics Analysis of an On-line Game over Steam Platform. In: Breitinger, F., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 259. Springer, Cham. https://doi.org/10.1007/978-3-030-05487-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-05487-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05486-1
Online ISBN: 978-3-030-05487-8
eBook Packages: Computer ScienceComputer Science (R0)