Video game exploit: Difference between revisions

Content deleted Content added
Tag: Reverted
 
(35 intermediate revisions by 25 users not shown)
Line 1:
{{Short description|Use of video game bugs to gain unintended advantage}}
{{about|exploited glitches in video games|the video game|Exploit (video game)}}
{{Original research|date=December 2014}}
In [[video game]]s, an '''exploit''' is the use of a [[software bug|bug]] or glitch, or use of elements of a game system in a manner not intended by the game's designers, in a way that gives a substantial unfair advantage to players using it.<ref name="DOG 03, 474">{{cite book | title=Developing online games | url=https://archive.org/details/developingonline0000mull | url-access=registration |author=Mulligan, Jessica |author2=Bridgette Patrovsky |chapter=Appendix F |page=[https://archive.org/details/developingonline0000mull/page/474 474] |publisher=New Riders |year=2003 |isbn=9781592730001}}</ref> However, whether particular acts constitute an exploit can be controversial, typically involving the argument that the issues are part of the game, and no changes or external programs are needed to take advantage of them.<ref name="Consalvo 07, 113">{{cite book | title=Cheating: gaining advantage in videogames | url=https://archive.org/details/cheatinggaininga00cons | url-access=limited |author=Consalvo, Mia |publisher=MIT Press |year=2007 |chapter=Chapter 5 |pages=[https://archive.org/details/cheatinggaininga00cons/page/n126 114]–115 |isbn=9780262033657}}</ref>
 
==Controversy==
 
Exploiting is considered [[cheating in online games|cheating]] by somemost in the gaming community and gaming industry, due to the unfair advantage usually gained by the exploiter.<ref name="Macaulay 17">{{cite web |url=https://www.nbianalytics.com/exploits-arent-cheating-neutralizing-attitudes-gaming-industry/ |title=Exploits Aren't Cheating, Are They? - Neutralizing Attitudes in the Gaming Industry |author= Macaulay, Ashton |work=National Business Innovations LLC |publisher=NBI Analytics |date=30 August 2017 |archive-url=https://web.archive.org/web/20200806064329/https://www.nbianalytics.com/exploits-arent-cheating-neutralizing-attitudes-gaming-industry/ |archive-date=6 August 2020 |url-status=live}}</ref> Whether an exploit is considered a cheat is a matter of widespread debate that varies between genres, games, and other factors. Most software developers of online games prohibit exploiting in their terms of service and often issue sanctions against players found to be exploiting.
There is some contention by exploiters that exploiting should not be considered cheating as it is merely taking advantage of actions allowed by the software. They view exploiting as a skill because certain exploits take a significant amount of time to find, or dexterity and timing to use. Many other players believe that exploits should be considered cheats that the developers should address and exploiters should be [[ban (law)|banned]].
 
Those who consider exploits cheating argue that they are contrary to the spirit of the game even if rules and code do not specifically prohibit them, undermining the enjoyable dynamics of it, and that they are destructive of the game's community.<ref name="Tavinor 09">{{cite book | title= The Art of Videogames: New Directions in Aesthetics | url= https://archive.org/details/artvideogamesnew00tavi | url-access= limited | publisher=John Wiley and Sons | author=Tavinor, Grant |year=2009 |isbn= 9781405187886 |chapter=Games Through Fiction |pages=[https://archive.org/details/artvideogamesnew00tavi/page/n117 107]–108}}</ref><ref name="Lopez 05">{{cite web |url=http://www.gamespy.com/articles/635/635262p1.html |title=WoW Duping: Fact or Fiction? |author=Lopez, Miguel |work=GameSpy |publisher=IGN Entertainment |date=20 July 2005 |archive-url=https://web.archive.org/web/20050723005303/http://www.gamespy.com/articles/635/635262p1.html |archive-date=23 July 2005 |url-status=live}}</ref> A ''[[World of Warcraft]]'' community manager described the effect of exploits on a game's community as "devastating".<ref name="Lopez 05" />
 
Defenders of exploits argue that the rules of the game allow them, and that players using exploits might not know they are behaving against the designer's intention.<ref name="Macaulay 17" /><ref name="DOG 03, 286">{{cite book | title=Developing online games | url=https://archive.org/details/developingonline0000mull | url-access=registration |author=Mulligan, Jessica |author2=Bridgette Patrovsky |chapter=Chapter 13 |page=[https://archive.org/details/developingonline0000mull/page/286 286] |publisher=New Riders |year=2003 |isbn=9781592730001}}</ref><ref name="Jakobsson 08, 280">{{cite book |title=Crimeware: understanding new attacks and defenses |author=Jakobsson, Markus |author2=Zulfikar Ramzan |publisher=Addison-Wesley |year=2008 |isbn=9780321501950 |chapter=Chapter 9: Virtual Worlds and Fraud |page=280}}</ref> So-called exploits, in this view, are not cheats because they do not change the game in any way, and all players who know of them can use them.<ref name="Consalvo 07, 113" /> The players who use such techniques may consider them fair for use in the game if they are not explicitly disallowed in the [[Terms of Service]] or other such rules governing participation.<ref name="DOG 03, 286" /> Exploiters also argue that the fastest way to get developers to update games to eliminate exploits is to use them as much as possible, as that greatly increases the quantity of complaints about them.i like bumms and i can not lie
 
==Griefing==
{{see also|Griefing}}
 
While players most often exploituse issuesvideo game exploits to gain a gameplay relevant advantage for themselves, sometimes they instead use them to irritate other players, whichalso isknown a form ofas [[griefer|griefing]].<ref name="Tavinor 09" /> One team of gamers in ''[[Team Fortress 2]]'' produced popular online videos demonstrating their griefing with several exploits present in the game, most of them being of little useintended forgameplay personal gainuse.<ref name="Gillen 08">{{cite web |url=http://www.escapistmagazine.com/articles/view/issues/issue_147/4856-Team-Roomba |title=Team Roomba |author=Gillen, Kieron |work=The Escapist |date=29 April 2008 |access-date=11 November 2009 |archive-url=https://web.archive.org/web/20080501083121/http://www.escapistmagazine.com/articles/view/issues/issue_147/4856-Team-Roomba |archive-date=1 May 2008 |url-status=dead}}</ref> Another famous incident during the ''[[Ultima Online]]'' [[beta test]] saw a player kill [[Lord British]] when that character was supposed to be invincible; the tester was later banned for exploiting because he did not report the bugs he found.<ref name="Lee 97">{{cite web |url=http://www.villagevoice.com/1997-09-23/news/ultimate-ultima/ |title=Ultimate Ultima |date=23 September 1997 |author=Lee, Edmund |work=The Village Voice |access-date=11 November 2009 |archive-url=https://web.archive.org/web/20080914060506/http://www.villagevoice.com/1997-09-23/news/ultimate-ultima/ |archive-date=14 September 2008 |url-status=dead}}</ref>
 
==Common types==
[[File:Dan Backslide Wavesash.gif|thumb|left|Wavedashing, an exploit mechanic used competitively in many [[platform fighter]] games, as demonstrated in a modded instance of ''[[Rivals of Aether]]''.]]
 
Common types of exploits include:
 
; [[Duping (gaming)|Duping]]: Duplicating items or money.
; [[Lag (video games)|Lag]] and disconnection exploits: A game with inadequate lag handling may let players intentionally cause lag for themselves to cause an advantage.<ref name="Consalvo 07, 113" /> Similarly, a game that lets a player disconnect immediately with no consequences may let players exit a game without suffering a loss. (''[[Shogun 2: Total War]]'')
;Geometry: Taking advantage of how the game world is built. Typically the goal of these exploits is to reach normally inaccessible areas or take unintended shortcuts in the game world. These are commonly achieved by going through walls, crossing invisible barriers made by the programmers, or scaling ledges not intended to be climbable.
 
; [[Twinking]]: Twinking usually refers to taking advantage of design flaws in the game's gearing system in order to equip a new or low-level character with much higher level gear. Other actions commonly referred to as "twinking" include giving a new character a large amount of gold, and intentionally keeping a character at a low level while gaining much better equipment.
; Movement speed bugs: These usually allow the player to move faster than intended, such as [[bunny hopping]]. Many of these have been embraced by certain games, such as skiing in the [[Tribes (video game series)|''Tribes'']] series.
; Safe zones: Places where a player can attack with no risk of being attacked back. This is often a form of an exploit in the geometry (terrain) of a game—however, a game may have areas that make players within them safe (especially in PvP games/zones in which the opposing faction(s) may not enter) from attack while not disallowing the safe players to attack.
; Game mechanics: Taking advantage of the systems that make up the gameplay. A game mechanics exploit is not a bug: it is a case in which a system is working as designed, but not as intended. An example is the "wavedash" in ''[[Super Smash Bros. Melee]]'', in which the momentum gained from using a directional aerial dodge could be retained on landing; with proper timing this allows characters to use a stationary attack while sliding across the ground or reposition themselves in a snappy, precise way.
; Cheesing: Performing repeated, usually considered cheap, attack moves in such a way that doesn't allow the enemy to respond or fight back. An example would be ''[[Street Fighter II]]'' in which one can perform repeated moves that keep the enemy being attacked and against the side of the screen, with no way for them to perform a counterattack.
 
Line 35 ⟶ 34:
==Response==
 
Developers may find it difficult to identify and respond to an exploit because players who discover vulnerabilities in a game may be reluctant to inform the game's developers, in order to continue exploiting.<ref name="Consalvo 07, 113" /> However, once developers learn of exploits, the response may include banning players who took advantage of the exploit, changing the game's rules to eliminate it or make it less useful, or even embracing the exploit. Positive opinions of the exploit can lead to the designers embracing it as [[emergent gameplay]], such as when skiing in the [[Tribes (video game series)|''Tribes'']] series of games gained developer support. The now-standard practice of [[rocket jumping]] originated in a similar way, by exploiting game mechanics in a way not foreseen by the developers. Otherwise, the developers may try to fix the underlying problem, or discourage use of the exploit if the issue cannot be clearly addressed by technical means. In severe cases, players may be banned. Further, the game state of the world may need to be reset to restore [[game balance]]. For example, following a serious currency [[duping (gaming)|dupe exploit]] in ''[[EverQuest II]]'', the developers removed large amounts of duped money from the game to address the rampant [[inflation]] it caused in the game's [[virtual economy]].<ref name="zdnet-eq2">{{cite web | title=Cheaters slam 'Everquest II' economy | author=Terdiman, Daniel | date=11 August 2005 | url=http://news.zdnet.com/2100-1040_22-144176.html | work=ZDNet News | access-date=21 February 2007 | author-link=Daniel Terdiman }}{{Deaddead link|date=July 2018 2024|bot=InternetArchiveBot medic}}{{cbignore|fix-attemptedbot=yes medic}}</ref>
 
==See also==
Line 48 ⟶ 47:
 
[[Category:Esports terminology]]
[[Category:Cheating in video games|Exploit]]
[[Category:Video game terminology|Exploit]]
[[Category:Video game culture]]
[[Category:Cheating in video games]]
[[Category:Video game terminology]]