mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-19 23:20:29 -04:00
remove dead urls, clean up readme
This commit is contained in:
parent
323465161a
commit
bede0e3e79
251 changed files with 12365 additions and 627 deletions
BIN
Pentesting_Scripts/.DS_Store
vendored
Normal file
BIN
Pentesting_Scripts/.DS_Store
vendored
Normal file
Binary file not shown.
53
Pentesting_Scripts/README.md
Normal file
53
Pentesting_Scripts/README.md
Normal file
|
@ -0,0 +1,53 @@
|
|||
# Pentesting Scripts
|
||||
|
||||
|
||||
## Auditing Code
|
||||
|
||||
* Initial value assignments (failure to assign initial values can lead to vulnerabilities).
|
||||
|
||||
* Memory corruption (see Memory_Exploits folder).
|
||||
|
||||
* Static analysis tools:
|
||||
- commercial: Fortify, Klockwork, Coverity
|
||||
- free: LLVM Clang Static Analyzer, FindBugs (Java), RATS
|
||||
|
||||
|
||||
|
||||
## Threat Modeling (Design Review)
|
||||
|
||||
1. Information Collection:
|
||||
* Assets
|
||||
* Entry points
|
||||
* External entities
|
||||
* External trust levels
|
||||
* Major components
|
||||
* User Scenarios
|
||||
|
||||
- Developer interviews
|
||||
- Developer documentation
|
||||
- Standards documentation
|
||||
- Sources profiling
|
||||
- System profiling: File system layout, code reuse, import/exports, sandboxing, scanning.
|
||||
|
||||
2. Application architecture modeling:
|
||||
- UML
|
||||
- Data flow diagrams (DFD)
|
||||
|
||||
3. Threat identification:
|
||||
- Attack trees: each subnode states an attack methodology that could be used to achieve the goal in the root node. Arc between nodes are AND connectors. Circular nodes are mitigation. Dashed lines indicated unlikely attack vector.
|
||||
- Textual representation.
|
||||
|
||||
4. Documentation of findings:
|
||||
- Thread, Affected Component, Description, Result, Mitigation strategy.
|
||||
- DREAD Risk Ratings (damage potential, reproducibility, exploitability, affected users, discoverability), with scores from 1 to 10.
|
||||
|
||||
|
||||
5. Prioritizing the implementation review
|
||||
|
||||
|
||||
### Application access:
|
||||
* Source only (static analysis)
|
||||
* Binary only (live analysis and reverse engineering)
|
||||
* Both source and binary access
|
||||
* Checked build: an binary with no source code but with debugging information.
|
||||
* Source black box: black box and fuzz testing (example: web applications). Example: auditing a web server with entry point at TCP port 80, you use a HTTP protocol fuzzer.
|
BIN
Pentesting_Scripts/networkintrusionpostermed.png
Normal file
BIN
Pentesting_Scripts/networkintrusionpostermed.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 902 KiB |
Loading…
Add table
Add a link
Reference in a new issue