Professional Documents
Culture Documents
by Jonathan Marcil
February 2017
Summary
Whos that guy?
What is Application Security?
What is Threat Modeling?
Existing models
Toolkit component: Simplified Risk Rating
Toolkit component: Attack Tree
Toolkit component: Data Flow Diagram
Whats next?
Who am I?
Yet another funny French Canadian
Former chapter leader of OWASP Montreal
Systematically structure
Attacks
Bad Actors
Countermeasures
Threat Intelligence
Is not threat modeling
Its half of it!
Threat actors
And what they have to gain
Simple tree
Root node is goal
Leaf nodes are ways to reach it
Other nodes are sub-goals
Can be flexible
And logic gates
Attack Tree: Open Safe
Attack Tree: IoT
Lets take an example of a device I have home
Whiteboard!
Trick on drawing: code it instead!
PlantUML
@startuml agent "Make my life miserable" as life
skinparam monochrome true agent "Randomware" as ransomware
agent "Invade my privacy" as privacy
agent "Mass mining" as mine agent "Mess with the lights" as mess
agent "Mass scan" as scan
agent "DDoS" as ddos life --> ransomware
agent "Control many devices \n(Botnet)" as botnet life --> privacy
mine --> botnet life --> mess
scan --> botnet
ddos --> botnet agent "View my habits" as habits
agent "Spy me live" as spy
agent "Use legit command" as legitcmd privacy --> habits
agent "Exploit device flaws" as flaws privacy --> spy
agent "Obtain device access" as access
botnet --> legitcmd agent "Steal cloud data" as data
botnet --> flaws habits --> data
botnet --> access spy --> data
data ---> cloud
agent "Get WiFi LAN access" as wifi
agent "Get Physical access" as phys agent "Sniff network" as sniff
agent "Place Factory Backdoor" as factory habits ---> sniff
agent "Hack cloud server" as cloud spy ---> sniff
access --> wifi access --> sniff
access --> phys sniff --> wifi
access --> factory sniff --> phys
access --> cloud
@enduml
PlantUML!
Abuse Flow
Case Diagram
Lessons Security
Learned Testing
Thanks to
OWASP Orange County
Security Org at Blizzard
You!
@jonathanmarcil
jonathan.marcil@owasp.org