mailing list archives
Re: Faster, smashter.
From: Dave Aitel <dave () immunityinc com>
Date: Tue, 09 Dec 2008 09:45:23 -0500
-----BEGIN PGP SIGNED MESSAGE-----
One technique we're doing this week with a client is taking an attack
tree and marking it up with dollar values. I.E. if you wanted to buy
an 0day in X component, how much would it cost?
This then is a simple summation to produce a "how much is it to get
into the internal network from the internet" which the business can
use to help them decide yay/nay on the project as a whole depending on
their own view of the threat and the value of the information they are
Halvar Flake wrote:
It seems that discussions in ITsec are periodic -- the same
discussions and same arguments come up again and again.
1. Of course attackers use new vulnerabilities. It is the nature of
offense. Defense is done "to the maximum of current knowledge".
Offense, by it's nature, has to expand on the status quo.
2. How do you simulate an attack with a new vulnerability if you
don't have one ?
Well, military folks do wargames all the time without actually
using up the arsenal they have on the shelves. Network attacks
should probably be done in a similar manner -- have an umpire, and
give the attacking team a few "0day cards". With these cards they
get high-probability code execution for a piece of software of
The pentest then proceeds like a game, but can be conducted on the
real network, too.
But I am repeating myself ...
Cheers, Halvar _______________________________________________
Dailydave mailing list Dailydave () lists immunitysec com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
Dailydave mailing list
Dailydave () lists immunitysec com
Re: Faster, smashter. rauc (Dec 09)