• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Finding preconditions and postconditions for an exploit

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses

View previous topic :: View next topic  
Author Message
NG
Just Arrived
Just Arrived


Joined: 17 Jul 2010
Posts: 0


Offline

PostPosted: Sat Jul 17, 2010 7:24 am    Post subject: Finding preconditions and postconditions for an exploit Reply with quote

Hi Everyone,

Hope someone can shed some light on the problem which I am currently facing.

I am trying to generate attack graph for a subnet which consists of a number of systems running vulnerable applications. An attack graph consists of attack paths which are chain of exploits, each of which lays the groundwork for the subsequent ones. It is used to model correlated multi-stage, multi-host attacks. Some of the exploits for those vulnerable applications are available. To generate the attack graph, we need to know the preconditions for an exploit and the effects (post conditions) generated by it after its execution.

But there is no source from which these preconditions and post conditions can be obtained in a structured manner.

If anyone has idea related to this problem, please do post a reply.

-NG
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register