
See Also:
Penetration testers
have adopted (formally or informally) a process known as threat modeling, which
was originally developed by network planners to develop defensive
countermeasures against an attack.
Penetration testers
and attackers have turned the defensive threat modeling methodology on its head
to improve the success of an attack. Offensive threat modeling is a formal
approach that combines the results of reconnaissance and research to develop an
attack strategy. An attacker has to consider the available
targets and identify
the type of targets listed as follows:
• Primary targets:
These targets when compromised, these targets will immediately support the
objective.
• Secondary
targets: These targets may provide information (security controls, password
and logging policies, and local and domain administrator names and passwords)
to support an attack or allow access to a primary target.
• Tertiary targets:
These targets may be unrelated to the testing or attack objective, but are
relatively easy to compromise and may provide information or a distraction from
the actual attack.
For each target type,
the tester has to determine the approach to be used. A single vulnerability can
be attacked using stealth techniques or multiple targets can be attacked using a volume of attacks in order
to rapidly exploit a target. If a large-scale attack is implemented, the noise
in the defender's control devices will frequently cause them to minimize logging
on the router and firewall or even fully disable them.
The approach to be
used will guide the selection of the exploit. Generally, attackers
follow an attack tree
methodology when creating a threat model, as shown in this video: