Finding preconditions and postconditions for an exploit

Networking/Security Forums -> Exploits // System Weaknesses

Author: NG PostPosted: Sat Jul 17, 2010 7:24 am    Post subject: Finding preconditions and postconditions for an exploit
    ----
Hi Everyone,

Hope someone can shed some light on the problem which I am currently facing.

I am trying to generate attack graph for a subnet which consists of a number of systems running vulnerable applications. An attack graph consists of attack paths which are chain of exploits, each of which lays the groundwork for the subsequent ones. It is used to model correlated multi-stage, multi-host attacks. Some of the exploits for those vulnerable applications are available. To generate the attack graph, we need to know the preconditions for an exploit and the effects (post conditions) generated by it after its execution.

But there is no source from which these preconditions and post conditions can be obtained in a structured manner.

If anyone has idea related to this problem, please do post a reply.

-NG



Networking/Security Forums -> Exploits // System Weaknesses


output generated using printer-friendly topic mod, All times are GMT + 2 Hours

Page 1 of 1

Powered by phpBB 2.0.x © 2001 phpBB Group