0% found this document useful (0 votes)
94 views2 pages

Assignment 1 - InFR 2600

This document is an attack tree created by Rahul Khinvasara to outline ways to disclose proprietary secrets from Tekk Systems. The primary goals are to either use an insider at Tekk Systems or physically access the main gate. Subgoals include duplicating security cards, accessing surveillance cameras remotely, physically accessing network server buildings, attacking the web server by finding details like host names and passwords, and remotely attacking the intranet using a dial-up connection. The end goal is to monitor and leak confidential information from Tekk Systems.

Uploaded by

marvadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views2 pages

Assignment 1 - InFR 2600

This document is an attack tree created by Rahul Khinvasara to outline ways to disclose proprietary secrets from Tekk Systems. The primary goals are to either use an insider at Tekk Systems or physically access the main gate. Subgoals include duplicating security cards, accessing surveillance cameras remotely, physically accessing network server buildings, attacking the web server by finding details like host names and passwords, and remotely attacking the intranet using a dial-up connection. The end goal is to monitor and leak confidential information from Tekk Systems.

Uploaded by

marvadi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Rahul Khinvasara 100344610

Assignment 1-Attack Tree

9/30/2015

Disclosure of Tekk Systems proprietary secrets:


OR

A. Use an insider that works in Tekk Systems


OR

1. Planting one yourself


2. Trusting one that works there

B. Physically get through the main gate


OR

3. Duplicating security card keys from the insider


4. Having the insider give you access

C. Attack the surveillance cameras remotely


AND 5. Get IP address and password
6. Use a continuous loop for the feed
D. Physically access Network services building
OR

7. Get security card from insider


8. Use the insider to help you get access to server rooms

E. Attack Tekk Systems Web Server


AND 9. Find Host Name
10. Find Network address range
11. Find the firewall IP address
12. Run brute force password
13. Monitor information leaks

G. Attack Tekk Systems intranet remotely using dial-up


AND 14. Use public switched telephone network (PSTN)
15. Gain access remote access server
16. Gain access to Intranet.
17. Monitor information leaks

You might also like