Lecture 5: April 7, 2021
Reading: text, §24.2
Due: Homework 1, due April 7, 2021; Lab 1, due April 19, 2021
- Penetration Studies
- Goals
- Where to start
- Unknown system
- Known system, no authorized access
- Known system, authorized access
- Flaw Hypothesis Methodology
- System analysis
- Hypothesis generation
- Hypothesis testing
- Generalization
- System Analysis
- Learn everything you can about the system
- Learn everything you can about operational procedures
- Compare to other systems
- Hypothesis Generation
- Study the system, look for inconsistencies in interfaces
- Compare to other systems’ flaws
- Compare to vulnerabilities models
- Hypothesis testing
- Look at system code, see if it would work (live experiment may be unneeded)
- If live experiment needed, observe usual protocols
- Generalization
- See if other programs, interfaces, or subjects/objects suffer from the same problem
- See if this suggests a more generic type of flaw
- Elimination
- Examples
- Michigan Terminal System
- Burroughs B6700 System