Outline for October 31, 2022
Happy Halloween!
Reading: text, §24.1–24.4
Due: Homework 3, due November 11; Progress report, due Nov 11 (Note change in due date!)
- Penetration Studies
- Goals
- Where to start
- Unknown system
- Known system, no authorized access
- Known system, authorized access
- Flaw Hypothesis Methodology
- System analysis
- Hypothesis generation
- Hypothesis testing
- Generalization
- System Analysis
- Learn everything you can about the system
- Learn everything you can about operational procedures
- Compare to other systems
- Hypothesis Generation
- Study the system, look for inconsistencies in interfaces
- Compare to other systems’ flaws
- Compare to vulnerabilities models
- Hypothesis testing
- Look at system code, see if it would work (live experiment may be unneeded)
- If live experiment needed, observe usual protocols
- Generalization
- See if other programs, interfaces, or subjects/objects suffer from the same problem
- See if this suggests a more generic type of flaw
- Elimination
- Examples
- Michigan Terminal System