THREAT
MODELLING
IN
PENETRATION
TESTING
Whoami?
❖ Kharim Mchatta
❖ CEO of HACK IT CONSULTANCY
❖ Cybersecurity professional (Pen tester & Digital Forensics expert)
❖ Founder of H4K-IT (Cybersec community inTZ)
❖ CTF player
❖ Blogger
❖ Author at eForensics and Pentets Magazine
❖ DW Swahili Subject matter expert (cybersecurity)
What is
Threat
Modelling
Threat
Modelling
From
Business
Perspective
Threat
Modelling
From
Business
Perspective
Hackers
PC Servers Applications
Firewall
Organization
PROTECTING
Threats
Threat Modelling from a business perspective is the process of
People
Assets
Virus/worms
BRUCE WAYNE/BATMAN THREAT MODEL
BATMAN’S ASSETS ATTACKERS
Batman Cave
Alfred
Email
Cell Phone
Police
Joker
Journalist
VECTOR’S
Low Risk
Med Risk
High Risk
BRUCE WAYNE/BATMAN THREAT MODEL
BATMAN’S ASSETS ATTACKERS
Batman Cave
Alfred
Email
Cell Phone
Police
Joker
Journalist
CONTROLS
Threat
Modelling
From
Attackers
Perspective
ASSETS ATTACKERS
ATTACKERS PERSPECTIVE
Hackers
Firewall
Server
Credentials
Admin Panel Hidden Directories
Databases
Mmmhh!!! I guess
this threat
modelling staff isn’t
bad after all
PERSONAL EXPERIENCE IN THREAT
MODELLING AS A NEWBIE
Kharim
Credentials
Internet Firewall
WordPress
Website
Admin Panel Backend
Access
Request goes
through
If not malicious
access
If malicious
Access denied
Successfully
Authenticated
PERSONAL EXPERIENCE IN THREAT
MODELLING AS AN EXPERIENCED NEWBIE
Kharim Internet
Firewall
WordPress
Website
Access Access
Check the technologies
Used by the application
Check for existence
Of anyWAF
Perform Manual
Enumeration
Admin Panel
If Present
Attacker may use
Tools for enumeration
Enumeration for
Credentials
If not Present
IMPORTANCE OF THREAT MODELLING
Determine where most effort should be applied on the system and
assets
Internet Banking
Bank Website
VS
Threat-modelling
methods uses
include.
• To create an abstraction of the system
• To create profiles of potential attackers, including their
goals and methods
• To create a catalogue of potential threats that may arise
THAT’S ALL FOLKS
Author: Kharim Mchatta
Contacts
Kharimhmchatta@gmail.com kharim.h mchatta
KMchatta

Threat Modelling in Penetration Testing | 2021