Skip to content

Commit

Permalink
Improve threat model section
Browse files Browse the repository at this point in the history
  • Loading branch information
StrangeRanger committed May 10, 2024
1 parent 23ab67f commit 3f18351
Showing 1 changed file with 7 additions and 1 deletion.
8 changes: 7 additions & 1 deletion LaTeX Writeup/threat-model.tex
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,10 @@

%-------------------------------------------------------------------------------

Our threat model concerns the scenario in which a system is attacked. Specifically, we focus on the scenario depicted in Figure~\ref{fig:network-topology}, where three interconnected computers form a subnet, with one of these computers compromised. Within this context, our threat model revolves around an attacker who has successfully gained access to one of the systems, as illustrated in the diagram. Once inside the network, the attacker's assumed objective is to scan other systems to identify vulnerabilities for lateral movement. The provided script, named ip-shuffle, plays a crucial role in this threat model, as it allows for the dynamic assignment of random IP addresses to network interfaces. The attackers' assumed capabilities are that they have basic user access to the compromised system, can perform network reconnaissance via scanning the network, and system persistence.
Our threat model involves a scenario where an adversary has successfully compromised a company device within a subnet on the company network. Figure~\ref{fig:network-topology} depicts the network topology in which this threat model takes place: three interconnected computers form a subnet, with one of these computers already compromised. In this scenario, the attacker is assumed to possess the following capabilities:
\begin{itemize}
\item \textbf{Basic User Access:} The attacker has basic user privileges on the compromised system.
\item \textbf{Network Reconnaissance:} The attacker can perform network reconnaissance by scanning the network.
\item \textbf{System Persistence:} The attacker can maintain persistent access to the compromised device.
\end{itemize}
Given these capabilities, the attacker seeks to gain valuable reconnaissance information, identify other devices on the network, and exploit any discovered vulnerabilities that could facilitate lateral movement. The \texttt{ip-shuffle} script aims to counter these activities by dynamically assigning random IP addresses to network interfaces, making it difficult for the attacker to establish a static view of the network and impeding their ability to conduct effective reconnaissance.

0 comments on commit 3f18351

Please sign in to comment.