97, 3/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¼­°æÀç
   5¹ø ÆÄÀÏ

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=17 [º¹»ç]


And it becomes really reallt difficult in my opinion.
±×¸®°í Á¦ »ý°¢¿¡ ±×°Ç ¸Å¿ì ¾öû³ª°Ô ¾î·Á¿öÁö°ÚÁö¿ä.

So, the method that I taught that was slightly more useful was application architecture method
±×·¡¼­, Á¦°¡ °¡¸£Ä£ ¹æ¹ýÁß ¾à°£ ´õ À¯¿ëÇÑ ¹æ¹ýÀº ¾îÇø®ÄÉÀÌ¼Ç ±¸Á¶ ºÐ¼® ¹æ¹ý(?)ÀÔ´Ï´Ù.

where you break the application down into the major components
¾îÇø®ÄÉÀ̼ÇÀ» Áß¿äÇÑ ºÎºÐµé·Î ³ª´©´Â °ÍÀÌÁö¿ä

these are some of the components that I propose.
À̰͵éÀº Á¦°¡ ÃßõÇÏ´Â ±¸¼º ¿ä¼ÒµéÀÔ´Ï´Ù.

And you have assigned number in to 1, 2 or 3
±×¸®°í ¿©·¯ºÐÀº (°¢ ¿ä¼Òµé¿¡)¼ýÀÚ 1, 2, 3À» ÇÒ´çÇÕ´Ï´Ù.

1 low it's a low risk It's on the internet (?)
1 ³·À½Àº ³·Àº À§Çè¼öÁØÀÔ´Ï´Ù. ±× ¿ä¼Ò°¡ ÀÎÅͳݿ¡ ¿Ã¶ó¿ÍÀÖÀ» °æ¿ìÀÌÁö¿ä.

2 mid which is maybe is on the internet but doesn't have critical information.
2 Áß°£Àº ¿ä¼Ò°¡ ÀÎÅͳݿ¡ ¿Ã¶ó¿Í ÀÖÀ»¼öµµ ÀÖÁö¸¸ Ä¡¸íÀûÀÎ Á¤º¸¸¦ Æ÷ÇÔÇÏÁö ¾ÊÀ» °æ¿ìÀÔ´Ï´Ù.

And 3is high risk it has ****II(???) and critical information
±×¸®°í 3Àº ³ôÀº À§Çè ¼öÁØÀ¸·Î *******¿Í Ä¡¸íÀûÀÎ Á¤º¸¸¦ Æ÷ÇÔÇÏ°í ÀÖÀ» °æ¿ìÀÔ´Ï´Ù.

If it is, it has some kind of secure server some interaction with the ******** could be exploited.
¸¸¾à ±×·¸´Ù¸é ±×°Ç ¾ÈÀüÇÑ ¼­¹ö¸¦ °¡Áö°í ÀÖÀ» °ÍÀÌ°í ******¿ÍÀÇ »óÈ£ÀÛ¿ëÀ» ÅëÇØ ÀÌ¿ëµÉ¼ö ÀÖ½À´Ï´Ù.

So once you have these values assigned to all of these ************* 6 values
¿©·¯ºÐÀÌ ÀÌ 6°¡Áö Ç׸ñ¿¡ ¸ðµÎ ¹øÈ£¸¦ ¸Å±ä µÚ¸é

Rather(??) 6 major sections, we assign them 1, 2, 3
6°¡Áö Áß¿äÇÑ Ç׸ñµé¿¡ ¹øÈ£ 1, 2, 3À» ¸Å±é´Ï´Ù

so 6times 3 will be 18 wil be the maximum value,
±×·¯´Ï±î 6 °öÇϱâ 3Àº 18ÀÌ´Ï±î ±×°Ô ÃÖ´ñ°ªÀÌ µÉ°ÍÀÌ°í¿ä

So you can have maximum of 18 which will be everything is really critical
±×·¯´Ï±î ¸ðµç°Ô Á¤¸»·Î ½É°¢ÇÒ °æ¿ì¿¡´Â ÃÖ´ë 18±îÁö »ç¿ëÇÒ¼ö ÀÖ½À´Ï´Ù.

Every single portion is on the internet,
¸ðµç ºÎºÐµéÀÌ ÀÎÅͳݿ¡ ¿Ã¶ó¿Í ÀÖÀ» °æ¿ìÀÔ´Ï´Ù

authorization is on the internet,
»ç¿ëÀÚ ÀÎÁõÀÌ ÀÎÅͳݿ¡ ÀÖ°í

crypto is on the internet,everything
¾ÏÈ£(?ºñ¹Ð?)°¡ ÀÎÅͳݿ¡ ÀÖ°í, ¹¹µçÁö¿ä

logging is on the internet, which is kind of unlikely
·Î±ëµµ ÀÎÅͳݿ¡ ÀÖÀ», º°·Î ÀÖÀ»¹ýÇÏÁö ¾ÊÀº »óȲÀÌÁö¿ä

You go ahead and actually *********** entire tortal comes to less than 8
¿©·¯ºÐÀÌ Á÷Á¢ (****ÃßÁ¤ ¹øÈ£¸¦ ¸Å±â¸é) Àüü °ªÀÌ 8º¸´Ù ÀÛÀ»¼ö°¡ ÀÖÀ»°Ì´Ï´Ù

Than you can say that "ok, it's not something that I need to look results right now'
±×·¸´Ù¸é ¿©·¯ºÐÀº "ÁÁ¾Æ ÀÌ°Ç ³»°¡ Áö±Ý´çÀå ÇؾßÇÒÀÏÀº ¾Æ´Ï±º"À̶ó°í ÇÒ¼ö ÀÖÀ»°Ì´Ï´Ù.

But if it is between 8 and 12, it's a medium risk you trying resolve.
ÇÏÁö¸¸ ¸¸¾à °á°ú°¡ 8°ú 12 »çÀ̶ó¸é, ±×°Ç Áß°£ ¼öÁØÀÇ À§ÇèÀÌ°í ¿©·¯ºÐÀº ÇØ°áÇϱâÀ§ÇØ ³ë·ÂÇØ¾ß ÇÒ°ÍÀÔ´Ï´Ù.

If anything bigger than 12, you definately want to resolve it.
¸¸¾à 12º¸´Ù °á°ú°¡ Å©´Ù¸é, ¿©·¯ºÐÀº ºÐ¸íÈ÷ ±×°É ÇØ°áÇÏ°í ½ÍÀ» °Ì´Ï´Ù.

Is this some of making any sense?
ÀÌÇØ°¡ °¡½Ã³ª¿ä?

Any quesion on this?
Áú¹® ÀÖ³ª¿ä?

Everyones at sleep?
¸ðµÎ ÁÖ¹«½Ã³ª¿ä?

Ok, so threat model check list,
ÁÁ¾Æ¿ä À§Çù ¸ðµ¨ üũ ¸®½ºÆ® ÀÔ´Ï´Ù.

every applications should be threat modeled in final stage(***??)if you want it
¸ðµç ÇÁ·Î±×·¥µéÀº ¿©·¯ºÐÀÌ ¿øÇÒ °æ¿ì ÃÖÁ¾ ´Ü°è¿¡¼­ À§Çù ¸ðµ¨À» °ÅÃÄ¾ß Çϸç

******at the design stage (????)
µðÀÚÀÎ ´Ü°è¿¡¼­

every threats should be analyzed
¸ðµç À§ÇùÀº ºÐ¼®µÇ¾î¾ß Çϸç

and when you do threat modeling it is important
±×¸®°í À§Çù ¸ðµ¨¸µÀ» ÇÒ‹š¿¡´Â ÀÌ°Ô Áß¿äÇÕ´Ï´Ù

that you assign the value and figure out which threats must be marked on first
¹øÈ£¸¦ ¸Å±â°í ¾î¶²°É ¸ÕÀú ÇØ°áÇؾßÇÒÁö ¾Ë¾Æ³»´Â °ÍÀ»

there has been application reviewd that has tons and tons of bugs
¾î¶² ÇÁ·Î±×·¥ÀÌ ¸®ºä °á°ú ¼ö¸¹Àº ¹ö±×¸¦ °¡Áö°í ÀÖ´Ù¸é

how do you figure out work on out vulnerabilities or issue of one hundread of vulnerabilites(????)
¾î¶»°Ô ¸î¹é°³°¡ ³Ñ´Â ¸ðµç Ãë¾àÁ¡µéÀ» ã¾Æ³»°í °íÄ¥¼ö ÀÖ°Ú½À´Ï±î(?????)

or hundread possible vulnerabilites.
ȤÀº ¸î¹é°¡ÁöÀÇ °¡´É¼ºÀÌ ÀÖ´Â Ãë¾àÁ¡µéÀ»

once you assigned the value and once figure out which area there could be major impact or it exjournal(??) accessible it falls betweeen that 12 and 18 "yeah let's go ahead and try resolve that first"

ÀÏ´Ü °ªÀ» °áÁ¤ÇÏ°í ¾î¶² ºÎºÐ¿¡ °¡Àå Å« ¿µÇâÀÌ ÀÖÀ»Áö ȤÀº ±×°Ô 12 ¿Í 18 »çÀ̶ó¸é "±×·¡ Àú°É ¸ÕÀú ÇØ°áÇÏÀÚ°í"ÇÒ¼ö ÀÖÀ» °Ì´Ï´Ù(??????????)

Where it's local possible previlege  escalation attack "oh look, ******** anyway so who cares?"
¸¸¾à ±×°Ô ·ÎÄà ±ÇÇÑ »ó½Â °ø°ÝÀ̶ó¸é "¿À À̰ͺÁ ¾î¶µç ************ ±×·¡¼­ ´©°¡ »ó°üÇÏ°Ú¾î?"

So you can think about in that way as well,
±×·¯´Ï ÀÌ·±½ÄÀ¸·Îµµ »ý°¢ÇϽǼö ÀÖÀ»°Ì´Ï´Ù.

and trying resolve vulnerabilites that falls between 12 and 18.
±×¸®°í 12¿¡¼­ 18»çÀÌÀÇ Ãë¾àÁ¡µéÀ» ÇØ°áÇÏ´Â °ÍÀÌÁö¿ä

So that's far the thread modeling on that. any questions? Yes sir.
ÀÌ°Ô Áö±Ý±îÁöÀÇ À§Çù ¸ðµ¨¸µÀ̾ú½À´Ï´Ù, Áú¹®ÀÖ³ª¿ä? ¿¹ ¼±»ý´Ô

how do you find 12 and 18 ten thousands lines of codes? (*****???*****)
¾î¶»°Ô ¸îõÁÙÀÇ ÄÚµåÁß¿¡¼­ 12¿¡¼­ 18»çÀÌ(À§Çù ¸ðµ¨¸µ ·¹º§)ÀÇ Ãë¾àÁ¡À» ãÁö¿ä?

They vary between ten to hundred
»óȲ¿¡ µû¶ó¼­ ¼ö½Ê¿¡¼­ ¼ö¹é°¡Áö ÀÖÀ»¼öµµ ÀÖÁö¿ä

and there have been applicatoins that have been a close to hundred plus
±×¸®°í ¾î¶² ¾îÇø®ÄÉÀ̼ǵéÀº ¼ö½Ê°³¸¦ ³Ñ¾î°¡±âµµ ÇßÁö¿ä(???)

it's allowded to do with the matruity of the product.
±×°Ç »óÇ°ÀÇ ¼º¼÷µµ¿¡ µû¶ó¼­ Çã¿ëµË´Ï´Ù(???)

If it is a not level one or first time relive version one than it goes down further down.
¸¸¾à ±×°Ô 1´Ü°è³ª ù¹ø° ¹öÁ¯ÀÌ ¾Æ´Ï¶ó¸é ÈξÀ ³·¾ÆÁö°ÚÁö¿ä

But good statistics I think john diega has his own website and his book building secure software
ÇÏÁö¸¸ ÁÁÀº Åë°è¿¡¼­´Â. Á¦ »ý°¢¿¡´Â Á¸ µð¿¡°¡¾¾°¡ ±×ºÐÀÇ À¥ »çÀÌÆ®¿Í ¾ÈÀüÇÑ ¼ÒÇÁÆ®¿þ¾î °è¹ßÀ̶ó´Â Ã¥¿¡¼­
some statistics of vulnerabilites and high risk one bulnerabilites.
Ãë¾àÁ¡°ú À§ÇèÇÑ Ãë¾àÁ¡µéÀÇ Åë°è¸¦ ½á³ù´Ù°í »ý°¢µË´Ï´Ù.

any other questions?
´Ù¸¥ Áú¹® ÀÖ³ª¿ä?

***************************************************
Á˼ÛÇÕ´Ï´Ù. ¾Æ¹«¸® ¼Ò¸®¸¦ Å©°Ô ÇÏ°í µé¾îµµ ¾Èµé¸®³×¿ä

So he asked how do you figure out complete score of threats
±×·¯´Ï±î ÀúºÐÀÌ ¿©Â庸½Å°Å´Â ¾î¶»°Ô ÃÖÁ¾ À§Çù ¼öÁØÀ» ¾Ë¾Æ³»°í

list of threats basically
±âº»ÀûÀ¸·Î´Â À§ÇèµéÀÇ ¸®½ºÆ®°ÚÁö¿ä

and how do you figure out what might be specific to your application
±×¸®°í ¾î¶»°Ô ±¸Ã¼ÀûÀ¸·Î ¾î¶²°Ô ¿©·¯ºÐÀÇ ¾îÇø®ÄÉÀ̼ǿ¡ Àû¿ëµÉÁö ¾Æ³Ä´Â °ÍÀÌÁö¿ä?

am I understanding it correctly?
Á¦°¡ Àß ÀÌÇØÇÏ°í Àִ°ǰ¡¿ä?

ÀÏÂï ¿Ã¸®°Ú´Ù°í Çسõ°í ¿Ü°«Áý °¬´Ù¿À´À¶ó ¸¶°¨ 10ºÐÀü±îÁö ÇãµÕ´ò³»¿ä....
Àεµ½Ä ¹ßÀ½¿¡ ¾ÆÁ÷ Àͼ÷ÇÏÁö ¾Ê¾Æ¼­ ³õÄ£ºÎºÐÀÌ ¸¹¾Æ¼­ Á˼ÛÇÕ´Ï´Ù.

  Hit : 1644     Date : 2011/05/10 11:50



    
¸Û¸Û °í»ý ¸¹À¸¼Ì½À´Ï´Ù! 2011/05/11  
47   À̹ø ÀÛ¾÷(nish_bhalla_auditing_source_code) ¿øº» ÆÄÀÏÀÌ¿ä.     W.H.
05/03 1725
46   ÀÚ¸·(¿µ¾î,Çѱ۸¸ ¿Ï¼º ½ÌÅ© ¿¡·¯)[1]     d4rkang3l
06/16 1718
45   ÆÄÆ® 2¿¡ ´ëÇÑ Çùµ¿ ¸®½º´×&¹ø¿ªÀ» ÁøÇàÇÕ´Ï´Ù.     ¸Û¸Û
05/16 1716
44   ÆÄÆ®2 ¾î¶»°Ô µÈ°ÅÁÒ..[2]     ahotsuna
05/16 1705
43   WIKI ¶Ç ´Ù¿îµÅ¼­ ÆÄÆ® 7 ¿©±â¿¡ ¿Ã¸³´Ï´Ù     ¸Û¸Û
06/02 1697
42   ¹ø¿ª ½ºÄÉÁì ¼öÁ¤ÇÏ¿´½À´Ï´Ù.     ¸Û¸Û
05/13 1686
41   ´Ù¸¥ ºÐµéÀº ¾ó¸¶³ª Çϼ̳ª¿ä?[3]     ahotsuna
07/31 1684
40   Á¦ 1ȸ ¹ø¿ª ÀÚ¸· °ü·ÃÀÔ´Ï´Ù.     ¸Û¸Û
06/02 1671
39   2¹ø ÆÄÆ® ¸®½º´×&¹ø¿ªÀÔ´Ï´Ù.[2]     stardung86
05/09 1668
38   Àú±â Á˼ÛÇѵ¥,,[1]     bluemario
05/12 1668
37   ÆÄÆ® 2¹ø ºÐ·®ÀÔ´Ï´Ù. (90% Á¤µµµÆ°í ¾ÆÁ÷ 10% - ¾à 30~40Ãʺз®- ¹Ì¿ÏÀÔ´Ï´Ù.))     CodeAche
08/02 1668
36   ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÌ ¾÷µ¥ÀÌÆ® µÇ¾ú½À´Ï´Ù.     ¸Û¸Û
05/21 1665
35   4¹ø ÆÄÆ® ¹ø¿ª ¿Ã¸³´Ï´Ù.     babyalpha
08/01 1658
  5¹ø ÆÄÀÏ[1]     ¼­°æÀç
05/10 1643
33   8¹ø ÆÄÆ®ÀÔ´Ï´Ù[1]     Prox
05/11 1643
32   Á¦ 1ȸ ¹ø¿ª ÁøÇà »óȲÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/11 1632
31   ¿À´Ã ÀÛ¾÷ ÇÒ ÆÄÆ® 4~6 ¸µÅ©ÀÔ´Ï´Ù.[4]     ¸Û¸Û
05/17 1625
30   7¹ø ÆÄÆ® ÂÉ°³ÁÖ½Ç ºÐ ã½À´Ï´Ù.[2]     ¸Û¸Û
05/11 1621
29   ÀÚ¸· - ÃÖÁ¾ ¼öÁ¤º»ÀÔ´Ï´Ù~     ¸Û¸Û
06/30 1602
28   ÆÄÆ®8 ºÐ·®ÀÔ´Ï´Ù.     lycan
08/02 1601
27   ¹ø¿ªÆÀ ºÐµé ÀüÈ­¹øÈ£Á» ÂÊÁö·Î º¸³»ÁÖ¼¼¿ä~     ¸Û¸Û
05/17 1600
26   ÆÄÆ® 7, 8¸¸ Á¶±Ý ´õ º¸°­ÇÏ°í ¹ø¿ª Á¾·áÇÏ°Ú½À´Ï´Ù~!     ¸Û¸Û
05/25 1599
25   5¿ù 20ÀÏ Á¤Æà ³»¿ë ¿ä¾àÀÔ´Ï´Ù.[4]     ¸Û¸Û
05/21 1597
24   ÀÚ¸· ¿Ã¸³´Ï´Ù~[4]     lycan
06/13 1596
23     [re] °³Çà ¹× ÀϺΠ¼öÁ¤ÇÑ ÀÚ¸· ¿Ã¸³´Ï´Ù.[1]     lycan
06/15 1596
[1][2] 3 [4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org