mailing list archives
Re: Info about attack trees
From: coderman <coderman () gmail com>
Date: Sat, 26 May 2012 13:50:36 -0700
On Sat, May 26, 2012 at 1:32 PM, Gage Bystrom <themadichib0d () gmail com> wrote:
If you havnt guessed from the replies, there are no such thing as an attack
The classical method is something along the lines of preform recon,
enumerate, attack, presist/extract data. You react based upon the
information you gather, the more information you have, the clearer it is on
to what the next step ought to be.
this concept is more useful in fully automated exploit +
post-exploitation systems, where you have an arsenal of exploits of
varying stealth, reliability, applicability. the result of exploit
preference, exploit chaining, and contingency paths based on real-time
feedback results in a tree like structure following the path of least
resistance to total compromise.
you need to prepare this tree ahead of time as a human in the loop
will only slow down the process and increase the risk of counter
measures frustrating further attack.
a pedant would call them exploit graphs ;)
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/