Attack Trees Method and Application in Red Teaming
Attack Trees Method and Application in Red Teaming
Red Teaming
who am i
▪ at Opposing Force
▪ We dedicate big % of our time in internal RESEARCH on HARDWARE,
SOFTWARE and METHODOLOGY
▪ We assess the HUMAN, CYBER and PHYSICAL security of
Corporations and Governments.
▪ We perform ATTACK SIMULATIONS with extended scope (often no
limitations at all).
what do we do
red teaming
v/s
benefit of attack tree simulation cyber pentest
case studies
agenda
red teaming
v/s
benefit of attack tree simulation cyber pentest
case studies
what is an attack tree
leaf nodes
root node
and/or nodes
X = cost
what is an attack tree
red teaming
v/s
benefit of attack tree simulation cyber pentest
case studies
red teaming v/s cyber pentest
https://blog.rapid7.com/2016/06/23/penetration-testing-vs-red-teaming-the-age-old-debate-of-pirates-vs-ninja-continues/
red teaming v/s cyber pentest
red teaming
v/s
benefit of attack tree simulation cyber pentest
case studies
benefit of attack tree simulation
leaf nodes
root node
and/or nodes
R(X) = 1..100
benefit of attack tree simulation
leaf nodes
root node
and/or nodes
C(X) = 1..100
benefit of attack tree simulation
leaf nodes
root node
and/or nodes
P(X) = 1..100
benefit of attack tree simulation
If we fail, we get back to our tree attack graph to perform a second path.
benefit of attack tree simulation
agenda
red teaming
v/s
benefit of attack tree simulation cyber pentest
case studies
crafting an effective attack tree
red teaming
v/s
benefit of attack tree simulation cyber security
case study
case study
Bribing/Collusion
case study
Bribing/Collusion
case study
Bribing/Collusion
case study
Bribing/Collusion
case study
case study
Bribing/Collusion
case study