Unit-Ix Cti 1
Unit-Ix Cti 1
Unit-Ix Cti 1
• In other words, data collection is one of the building blocks of cyber threat
intelligence.
Threat perspectives
What is Cyber TI and how can you use it? Author name her
information on methodologies
changing risk and tactics.
can be used to inform decisions regarding
Long
incoming malware.
Immediateuse
• Vulnerability prioritisation
• Brand monitoring
Dissemination
• Fraud detection Processing
Slide #31
Understanding the Adversary’s View
1. Identify System Assets.
• System resources that an adversary might attempt to
access, modify, or steal.
• Ex: credit cards, network bandwidth, user access.
2. Identify Entry Points.
• Any location where data or control transfers between
the system being modeled and another system.
• Ex: network sockets, RPCs, web forms, files
3. Determine Trust Levels.
• Privileges external entities have to legitimately use
system resources.
Slide #32
Identify System Assets
• User login data
• User personal data
• Web process resources
• Execute code as web server
• Network/disk resources
• Application resources
• Database server resources
• Access to stored data
• Organization’s reputation
Slide #33
Discover Entry Points
Any method for system to accept input
Example: http://cs.nku.edu/ctrl.psp?pg=login
• Web server: cs.nku.edu
• All network protocols that can access host
• Web server specific attacks
• ctrl.psp
• Your controller application
• pg=login
• The login subsystem invoked by controller
Slide #34
Analyze Entry Points
1. Are you missing any potential back door entry points?
• What if attacker is on the web server?
• What if attacker between web and db servers?
2. How does system distinguish between bad and good input?
3. Can system distinguish a request from a legitimate client from a
replay attack?
Slide #35
Trust Levels
Resources with higher trust levels are accessible to
fewer users, but higher trust levels offer access to a
wider range of resources.
Trust Levels
• Remote Unauthenticated Users
• Remote Authenticated User
• Remote Application Admin User
• Web Administrator
• Web Server Process
• DB Administrator
Slide #36
Characterize System Security
1. Use and misuse scenarios.
• How do users use the system to fulfill needs?
• How could an adversary use these system interfaces to attack the system?
2. Identify assumptions and dependencies.
• How does system security depend on external systems?
• What assumptions do components make about data or control transfers
with other components?
3. Model the system.
• Model how system processes data from each entry point using tools like
DFDs.
Slide #37
Use Case Example
UC 1: Login to Web Store
Primary Actor: Customer
Stakeholders and Interests:
• Customer: Wants to purchase products.
Preconditions: Customer has web access.
Postconditions: Customer has access to their account, with the ability
to pay for and ship products.
Summary: Customer gains access to system using an assigned
username and password.
Slide #38
Misuse Case Example
MUC 1: Sniff Password
Primary Actor: Attacker
Stakeholders and Interests:
• Attacker: Wants to obtain user credentials.
Preconditions: Attacker has access to a machine on network path
between user and system.
Postconditions: Attacker has obtained one or more valid usernames
and passwords.
Summary: Attacker obtains and later misuses passwords to gain
unauthorized access to system.
Slide #39
Misuse Case Example
Basic Flow:
1. Attacker installs network sniffer.
2. Sniffer saves all packets which contain strings matching
“Logon,” “Username,” or “Password.”
3. Attacker reads sniffer logs.
4. Attacker finds valid username/password in log.
5. Attacker uses sniffed password to access system.
Slide #40
Misuse Case Example
Alternate Flows:
1a. Attacker not on path between user and
system:
1. Attacker uses ARP poisoning or similar attack to
redirect user packets through his system.
1b. Customer uses wireless connection.
1. Attacker drives to customer location.
2. Attacker uses wireless sniffer to intercept passwords.
4a. Attacker finds no passwords in log
1. Continue sniffing until a password is found.
Slide #41
STRIDE Model: Threat Categorization
• Spoofing
• ex: Replaying authentication transaction.
• Tampering
• ex: Modifying authentication files to add new user.
• Repudiation
• ex: Denying that you purchased items you actually did.
• Information disclosure
• ex: Obtaining a list of customer credit card numbers.
• Denial of service
• ex: Consuming CPU time via hash algorithm weakness.
• Elevation of privilege
ex: Subverting a privileged program to run your cmds.
Slide #42
Analyze Threats
• Decompose threats into individual, testable conditions using attack
trees.
• Attack Trees
• Hierarchical decomposition of a threat.
• Root of tree is adversary’s goal in the attack.
• Each level below root decomposes the attack into finer approaches.
• Child nodes are ORed together by default.
• Special notes may indicate to AND them.
Slide #43
Attack Trees—Graph Notation
Goal: Read file from password-protected PC.
Read File
Slide #44
Attack Trees—Text Notation
Goal: Read message sent from one PC to another.
1. Convince sender to reveal message.
1.1 Blackmail.
1.2 Bribe.
2. Read message when entered on sender’s PC.
1.1 Visually monitor PC screen.
1.2 Monitor EM radiation from screen.
3. Read message when stored on receiver’s PC.
1.1 Get physical access to hard drive.
1.2 Infect user with spyware.
4. Read message in transit.
1.1 Sniff network.
1.2 Usurp control of mail server. Slide #45
Evaluate Risk with DREAD Model
• Damage Potential
• Extent of damage if vulnerability exploited.
• Reproducibility
• How often attempt at exploitation works.
• Exploitability
• Amount of effort required to exploit vulnerability.
• Affected Users.
• Ration of installed instances of system that would be affected if exploit
became widely available.
• Discoverability
• Likelihood that vulnerability will be discovered.
Slide #46
Quantifying Threats
• Calculate risk value for nodes in attack tree
• Start at bottom of tree.
• Assign a number 1-10 to each DREAD item.
• Assign average of numbers to node.
• Propagate risk values to parent nodes.
• Alternate technique: monetary evaluation
• Estimate monetary value to carry out attacks.
• Propagate values to parent nodes as above.
• Note: smaller values are higher risks in this method.
Slide #47
Attack Tree Exercise
• Create an attack tree for the reading a message stored on the mail
server that you described in the DFD exercise.
• Consider all entry points.
• While you’re starting as an unauthorized network user, consider all trust
levels in constructing your tree, with gaining the required trust level to
conduct your attack being one of your subgoals.
Slide #48