19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attack tree analysis is the process of creating<br />

a flowchart-type mapping of how malicious<br />

attackers would attack a system. Attack trees<br />

are typically used in higher-level information<br />

risk analyses and by security-savvy development<br />

teams when planning out a new software<br />

project. If you really want to take your ethical<br />

hacking to the next level by thoroughly planning<br />

your attacks, working very methodically, and<br />

being more professional to boot, then attack<br />

tree analysis is just the tool you need.<br />

Chapter 3: Developing Your Ethical Hacking Plan<br />

Attack tree analysis<br />

The only drawback is that attack trees can take<br />

considerable time to draw out and require a<br />

fair amount of expertise. Why sweat it, though,<br />

when you can use a computer to do a lot of<br />

the work for you? A commercial tool called<br />

SecurITree, by Amenaza Technologies Limited<br />

(www.amenaza.com), specializes in attack<br />

tree analysis, and you may consider adding it<br />

to your toolbox. The following figure shows a<br />

sample SecurITree attack tree analysis.<br />

What specific systems you should test depends on several factors. If you<br />

have a small network, you can test everything. Consider testing just publicfacing<br />

hosts such as e-mail and web servers and their associated applications.<br />

The ethical hacking process is flexible. Base these decisions on what<br />

makes the most business sense.<br />

39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!