97, 4/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¼­°æÀç
   5¹ø ÆÄÀÏ

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=17 [º¹»ç]


And it becomes really reallt difficult in my opinion.
±×¸®°í Á¦ »ý°¢¿¡ ±×°Ç ¸Å¿ì ¾öû³ª°Ô ¾î·Á¿öÁö°ÚÁö¿ä.

So, the method that I taught that was slightly more useful was application architecture method
±×·¡¼­, Á¦°¡ °¡¸£Ä£ ¹æ¹ýÁß ¾à°£ ´õ À¯¿ëÇÑ ¹æ¹ýÀº ¾îÇø®ÄÉÀÌ¼Ç ±¸Á¶ ºÐ¼® ¹æ¹ý(?)ÀÔ´Ï´Ù.

where you break the application down into the major components
¾îÇø®ÄÉÀ̼ÇÀ» Áß¿äÇÑ ºÎºÐµé·Î ³ª´©´Â °ÍÀÌÁö¿ä

these are some of the components that I propose.
À̰͵éÀº Á¦°¡ ÃßõÇÏ´Â ±¸¼º ¿ä¼ÒµéÀÔ´Ï´Ù.

And you have assigned number in to 1, 2 or 3
±×¸®°í ¿©·¯ºÐÀº (°¢ ¿ä¼Òµé¿¡)¼ýÀÚ 1, 2, 3À» ÇÒ´çÇÕ´Ï´Ù.

1 low it's a low risk It's on the internet (?)
1 ³·À½Àº ³·Àº À§Çè¼öÁØÀÔ´Ï´Ù. ±× ¿ä¼Ò°¡ ÀÎÅͳݿ¡ ¿Ã¶ó¿ÍÀÖÀ» °æ¿ìÀÌÁö¿ä.

2 mid which is maybe is on the internet but doesn't have critical information.
2 Áß°£Àº ¿ä¼Ò°¡ ÀÎÅͳݿ¡ ¿Ã¶ó¿Í ÀÖÀ»¼öµµ ÀÖÁö¸¸ Ä¡¸íÀûÀÎ Á¤º¸¸¦ Æ÷ÇÔÇÏÁö ¾ÊÀ» °æ¿ìÀÔ´Ï´Ù.

And 3is high risk it has ****II(???) and critical information
±×¸®°í 3Àº ³ôÀº À§Çè ¼öÁØÀ¸·Î *******¿Í Ä¡¸íÀûÀÎ Á¤º¸¸¦ Æ÷ÇÔÇÏ°í ÀÖÀ» °æ¿ìÀÔ´Ï´Ù.

If it is, it has some kind of secure server some interaction with the ******** could be exploited.
¸¸¾à ±×·¸´Ù¸é ±×°Ç ¾ÈÀüÇÑ ¼­¹ö¸¦ °¡Áö°í ÀÖÀ» °ÍÀÌ°í ******¿ÍÀÇ »óÈ£ÀÛ¿ëÀ» ÅëÇØ ÀÌ¿ëµÉ¼ö ÀÖ½À´Ï´Ù.

So once you have these values assigned to all of these ************* 6 values
¿©·¯ºÐÀÌ ÀÌ 6°¡Áö Ç׸ñ¿¡ ¸ðµÎ ¹øÈ£¸¦ ¸Å±ä µÚ¸é

Rather(??) 6 major sections, we assign them 1, 2, 3
6°¡Áö Áß¿äÇÑ Ç׸ñµé¿¡ ¹øÈ£ 1, 2, 3À» ¸Å±é´Ï´Ù

so 6times 3 will be 18 wil be the maximum value,
±×·¯´Ï±î 6 °öÇϱâ 3Àº 18ÀÌ´Ï±î ±×°Ô ÃÖ´ñ°ªÀÌ µÉ°ÍÀÌ°í¿ä

So you can have maximum of 18 which will be everything is really critical
±×·¯´Ï±î ¸ðµç°Ô Á¤¸»·Î ½É°¢ÇÒ °æ¿ì¿¡´Â ÃÖ´ë 18±îÁö »ç¿ëÇÒ¼ö ÀÖ½À´Ï´Ù.

Every single portion is on the internet,
¸ðµç ºÎºÐµéÀÌ ÀÎÅͳݿ¡ ¿Ã¶ó¿Í ÀÖÀ» °æ¿ìÀÔ´Ï´Ù

authorization is on the internet,
»ç¿ëÀÚ ÀÎÁõÀÌ ÀÎÅͳݿ¡ ÀÖ°í

crypto is on the internet,everything
¾ÏÈ£(?ºñ¹Ð?)°¡ ÀÎÅͳݿ¡ ÀÖ°í, ¹¹µçÁö¿ä

logging is on the internet, which is kind of unlikely
·Î±ëµµ ÀÎÅͳݿ¡ ÀÖÀ», º°·Î ÀÖÀ»¹ýÇÏÁö ¾ÊÀº »óȲÀÌÁö¿ä

You go ahead and actually *********** entire tortal comes to less than 8
¿©·¯ºÐÀÌ Á÷Á¢ (****ÃßÁ¤ ¹øÈ£¸¦ ¸Å±â¸é) Àüü °ªÀÌ 8º¸´Ù ÀÛÀ»¼ö°¡ ÀÖÀ»°Ì´Ï´Ù

Than you can say that "ok, it's not something that I need to look results right now'
±×·¸´Ù¸é ¿©·¯ºÐÀº "ÁÁ¾Æ ÀÌ°Ç ³»°¡ Áö±Ý´çÀå ÇؾßÇÒÀÏÀº ¾Æ´Ï±º"À̶ó°í ÇÒ¼ö ÀÖÀ»°Ì´Ï´Ù.

But if it is between 8 and 12, it's a medium risk you trying resolve.
ÇÏÁö¸¸ ¸¸¾à °á°ú°¡ 8°ú 12 »çÀ̶ó¸é, ±×°Ç Áß°£ ¼öÁØÀÇ À§ÇèÀÌ°í ¿©·¯ºÐÀº ÇØ°áÇϱâÀ§ÇØ ³ë·ÂÇØ¾ß ÇÒ°ÍÀÔ´Ï´Ù.

If anything bigger than 12, you definately want to resolve it.
¸¸¾à 12º¸´Ù °á°ú°¡ Å©´Ù¸é, ¿©·¯ºÐÀº ºÐ¸íÈ÷ ±×°É ÇØ°áÇÏ°í ½ÍÀ» °Ì´Ï´Ù.

Is this some of making any sense?
ÀÌÇØ°¡ °¡½Ã³ª¿ä?

Any quesion on this?
Áú¹® ÀÖ³ª¿ä?

Everyones at sleep?
¸ðµÎ ÁÖ¹«½Ã³ª¿ä?

Ok, so threat model check list,
ÁÁ¾Æ¿ä À§Çù ¸ðµ¨ üũ ¸®½ºÆ® ÀÔ´Ï´Ù.

every applications should be threat modeled in final stage(***??)if you want it
¸ðµç ÇÁ·Î±×·¥µéÀº ¿©·¯ºÐÀÌ ¿øÇÒ °æ¿ì ÃÖÁ¾ ´Ü°è¿¡¼­ À§Çù ¸ðµ¨À» °ÅÃÄ¾ß Çϸç

******at the design stage (????)
µðÀÚÀÎ ´Ü°è¿¡¼­

every threats should be analyzed
¸ðµç À§ÇùÀº ºÐ¼®µÇ¾î¾ß Çϸç

and when you do threat modeling it is important
±×¸®°í À§Çù ¸ðµ¨¸µÀ» ÇÒ‹š¿¡´Â ÀÌ°Ô Áß¿äÇÕ´Ï´Ù

that you assign the value and figure out which threats must be marked on first
¹øÈ£¸¦ ¸Å±â°í ¾î¶²°É ¸ÕÀú ÇØ°áÇؾßÇÒÁö ¾Ë¾Æ³»´Â °ÍÀ»

there has been application reviewd that has tons and tons of bugs
¾î¶² ÇÁ·Î±×·¥ÀÌ ¸®ºä °á°ú ¼ö¸¹Àº ¹ö±×¸¦ °¡Áö°í ÀÖ´Ù¸é

how do you figure out work on out vulnerabilities or issue of one hundread of vulnerabilites(????)
¾î¶»°Ô ¸î¹é°³°¡ ³Ñ´Â ¸ðµç Ãë¾àÁ¡µéÀ» ã¾Æ³»°í °íÄ¥¼ö ÀÖ°Ú½À´Ï±î(?????)

or hundread possible vulnerabilites.
ȤÀº ¸î¹é°¡ÁöÀÇ °¡´É¼ºÀÌ ÀÖ´Â Ãë¾àÁ¡µéÀ»

once you assigned the value and once figure out which area there could be major impact or it exjournal(??) accessible it falls betweeen that 12 and 18 "yeah let's go ahead and try resolve that first"

ÀÏ´Ü °ªÀ» °áÁ¤ÇÏ°í ¾î¶² ºÎºÐ¿¡ °¡Àå Å« ¿µÇâÀÌ ÀÖÀ»Áö ȤÀº ±×°Ô 12 ¿Í 18 »çÀ̶ó¸é "±×·¡ Àú°É ¸ÕÀú ÇØ°áÇÏÀÚ°í"ÇÒ¼ö ÀÖÀ» °Ì´Ï´Ù(??????????)

Where it's local possible previlege  escalation attack "oh look, ******** anyway so who cares?"
¸¸¾à ±×°Ô ·ÎÄà ±ÇÇÑ »ó½Â °ø°ÝÀ̶ó¸é "¿À À̰ͺÁ ¾î¶µç ************ ±×·¡¼­ ´©°¡ »ó°üÇÏ°Ú¾î?"

So you can think about in that way as well,
±×·¯´Ï ÀÌ·±½ÄÀ¸·Îµµ »ý°¢ÇϽǼö ÀÖÀ»°Ì´Ï´Ù.

and trying resolve vulnerabilites that falls between 12 and 18.
±×¸®°í 12¿¡¼­ 18»çÀÌÀÇ Ãë¾àÁ¡µéÀ» ÇØ°áÇÏ´Â °ÍÀÌÁö¿ä

So that's far the thread modeling on that. any questions? Yes sir.
ÀÌ°Ô Áö±Ý±îÁöÀÇ À§Çù ¸ðµ¨¸µÀ̾ú½À´Ï´Ù, Áú¹®ÀÖ³ª¿ä? ¿¹ ¼±»ý´Ô

how do you find 12 and 18 ten thousands lines of codes? (*****???*****)
¾î¶»°Ô ¸îõÁÙÀÇ ÄÚµåÁß¿¡¼­ 12¿¡¼­ 18»çÀÌ(À§Çù ¸ðµ¨¸µ ·¹º§)ÀÇ Ãë¾àÁ¡À» ãÁö¿ä?

They vary between ten to hundred
»óȲ¿¡ µû¶ó¼­ ¼ö½Ê¿¡¼­ ¼ö¹é°¡Áö ÀÖÀ»¼öµµ ÀÖÁö¿ä

and there have been applicatoins that have been a close to hundred plus
±×¸®°í ¾î¶² ¾îÇø®ÄÉÀ̼ǵéÀº ¼ö½Ê°³¸¦ ³Ñ¾î°¡±âµµ ÇßÁö¿ä(???)

it's allowded to do with the matruity of the product.
±×°Ç »óÇ°ÀÇ ¼º¼÷µµ¿¡ µû¶ó¼­ Çã¿ëµË´Ï´Ù(???)

If it is a not level one or first time relive version one than it goes down further down.
¸¸¾à ±×°Ô 1´Ü°è³ª ù¹ø° ¹öÁ¯ÀÌ ¾Æ´Ï¶ó¸é ÈξÀ ³·¾ÆÁö°ÚÁö¿ä

But good statistics I think john diega has his own website and his book building secure software
ÇÏÁö¸¸ ÁÁÀº Åë°è¿¡¼­´Â. Á¦ »ý°¢¿¡´Â Á¸ µð¿¡°¡¾¾°¡ ±×ºÐÀÇ À¥ »çÀÌÆ®¿Í ¾ÈÀüÇÑ ¼ÒÇÁÆ®¿þ¾î °è¹ßÀ̶ó´Â Ã¥¿¡¼­
some statistics of vulnerabilites and high risk one bulnerabilites.
Ãë¾àÁ¡°ú À§ÇèÇÑ Ãë¾àÁ¡µéÀÇ Åë°è¸¦ ½á³ù´Ù°í »ý°¢µË´Ï´Ù.

any other questions?
´Ù¸¥ Áú¹® ÀÖ³ª¿ä?

***************************************************
Á˼ÛÇÕ´Ï´Ù. ¾Æ¹«¸® ¼Ò¸®¸¦ Å©°Ô ÇÏ°í µé¾îµµ ¾Èµé¸®³×¿ä

So he asked how do you figure out complete score of threats
±×·¯´Ï±î ÀúºÐÀÌ ¿©Â庸½Å°Å´Â ¾î¶»°Ô ÃÖÁ¾ À§Çù ¼öÁØÀ» ¾Ë¾Æ³»°í

list of threats basically
±âº»ÀûÀ¸·Î´Â À§ÇèµéÀÇ ¸®½ºÆ®°ÚÁö¿ä

and how do you figure out what might be specific to your application
±×¸®°í ¾î¶»°Ô ±¸Ã¼ÀûÀ¸·Î ¾î¶²°Ô ¿©·¯ºÐÀÇ ¾îÇø®ÄÉÀ̼ǿ¡ Àû¿ëµÉÁö ¾Æ³Ä´Â °ÍÀÌÁö¿ä?

am I understanding it correctly?
Á¦°¡ Àß ÀÌÇØÇÏ°í Àִ°ǰ¡¿ä?

ÀÏÂï ¿Ã¸®°Ú´Ù°í Çسõ°í ¿Ü°«Áý °¬´Ù¿À´À¶ó ¸¶°¨ 10ºÐÀü±îÁö ÇãµÕ´ò³»¿ä....
Àεµ½Ä ¹ßÀ½¿¡ ¾ÆÁ÷ Àͼ÷ÇÏÁö ¾Ê¾Æ¼­ ³õÄ£ºÎºÐÀÌ ¸¹¾Æ¼­ Á˼ÛÇÕ´Ï´Ù.

  Hit : 1638     Date : 2011/05/10 11:50



    
¸Û¸Û °í»ý ¸¹À¸¼Ì½À´Ï´Ù! 2011/05/11  
22   ¹ø¿ª ½ºÄÉÁì ¼öÁ¤ÇÏ¿´½À´Ï´Ù.     ¸Û¸Û
05/13 1679
21   Àú±â Á˼ÛÇѵ¥,,[1]     bluemario
05/12 1663
20   ¸¶Áö¸· ÆÄÆ® ÀÔ´Ï´Ù. ´Ê¾î¼­ Á˼ÛÇÕ´Ï´Ù. ¤¾[1]     k1rha
05/12 1783
19   ±ÞÇÑ´ë·Î 6¹øÆÄÆ®[1]     bluemario
05/11 1908
18   7¹ø ÆÄÆ® ÂÉ°³ÁÖ½Ç ºÐ ã½À´Ï´Ù.[2]     ¸Û¸Û
05/11 1618
17   Á¦ 1ȸ ¹ø¿ª ÁøÇà »óȲÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/11 1626
16   ±³Á¤ ´ã´çÀÚµéÀ» Ãß°¡ ¸ðÁýÇÕ´Ï´Ù.     ¸Û¸Û
05/11 1517
15   8¹ø ÆÄÆ®ÀÔ´Ï´Ù[1]     Prox
05/11 1640
14   11ÀÏ ¼ö¿äÀÏ ³· 12½Ã¿¡ 1Â÷ Á¤¸®¸¦ ÇÏ°Ú½À´Ï´Ù.[1]     ¸Û¸Û
05/11 1579
13   °ÇÀÇ»çÇ×??[1]     ¼­°æÀç
05/10 1500
  5¹ø ÆÄÀÏ[1]     ¼­°æÀç
05/10 1637
11   1¹ø ÆÄÆ® ÀÏ´Ü Áö±Ý±îÁö ÇÑ°Å ¿Ã¸³´Ï´Ù.[2]     W.H.
05/10 1736
10   2¹ø ÆÄÆ® ¸®½º´×&¹ø¿ªÀÔ´Ï´Ù.[2]     stardung86
05/09 1667
9   4¹ø ÆÄÆ® ¸®½º´×&¹ø¿ª ³»¿ëÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/09 1743
8   ÀÛ¾÷ÇÏ´Ù ¸·È÷½Å ºÐ, ±×¸®°í ÀÛ¾÷ ÇÒ´ç ¸ø¹ÞÀ¸½Å ºÐ ºÁÁÖ¼¼¿ä     ¸Û¸Û
05/06 1736
7   3¹ø° ÆÄÆ® ¾Èµé¸®´Â ºÎºÐ »©°í ´ÙÇß½À´Ï´Ù[9]     ahotsuna
05/04 1880
6   ¾ÆÂü ¹ø¿ª¹®Àº Á¸´ñ¸»·Î Àû¾îÁÖ¼¼¿ä~ (³Ã¹«)     ¸Û¸Û
05/04 1363
5   À̹ø ÀÛ¾÷(nish_bhalla_auditing_source_code) ¿øº» ÆÄÀÏÀÌ¿ä.     W.H.
05/03 1720
4   À§¿¡ ¸Û¸Û´ÔÀÌ ¿Ã¸®½Å µ¿¿µ»óÀ¸·Î ÀÛ¾÷ÇØÁÖ¼¼¿ä~ (ÀÌ °Ô½Ã¹°X)[21]     W.H.
05/03 1746
3   ¸â¹öºÐµé ³×ÀÌÆ®¿Â or Ä«Åå or Æ®À§ÅÍ ±³È¯ÇØ¿ä[4]     ¸Û¸Û
05/03 2046
2   [1ȸ] µ¿¿µ»ó ºÐÇÒÇØÁÖ½Ç ºÐ![2]     ¸Û¸Û
05/03 2128
1   [1ȸ] ¿ªÇÒ ºÐ´ãÇÕ´Ï´Ù.[1]     ¸Û¸Û
05/03 1744
[1][2][3] 4

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org