πŸ•ΆοΈ
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • πŸ’ΎHack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • πŸ“–Documents
  • πŸ‘¨β€πŸ«HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • πŸ“‘Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • πŸ‘¨β€πŸ’ΌManagement Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • πŸ›‘οΈSecurity Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • πŸ›Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • βš”οΈOffensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • πŸ”«Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • πŸ”ͺAttacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • πŸ’‰Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • πŸ…°οΈDNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • πŸ‘£Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • πŸ–₯️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  • Breakdown of STRIDE Threat Categories
  • 1. Spoofing (S) – Identity Impersonation
  • 2. Tampering (T) – Data Integrity Violations
  • 3. Repudiation (R) – Denying Actions or Transactions
  • 4. Information Disclosure (I) – Unauthorized Data Exposure
  • 5. Denial of Service (DoS) – Service Disruption
  • 6. Elevation of Privilege (E) – Unauthorized Access Escalation
  • Why STRIDE is Important for Security Teams
  • Conclusion
  1. Security Concepts
  2. Risk Assessment Models

STRIDE Threat Model

PreviousDREAD Risk Assessment ModelNextCommon Vulnerability Scoring System (CVSS)

Last updated 4 months ago

STRIDE is a threat categorization model developed by Microsoft to help security teams systematically identify and assess security threats in applications, networks, and systems. It is particularly useful in threat modeling, allowing organizations to anticipate potential attack vectors and implement appropriate mitigations early in the design phase.

Each letter in STRIDE represents a specific type of threat, covering different security principles such as authentication, integrity, non-repudiation, confidentiality, availability, and authorization.


Breakdown of STRIDE Threat Categories

1. Spoofing (S) – Identity Impersonation

  • Description: An attacker impersonates another entity, such as a legitimate user, process, or device, to gain unauthorized access to a system or resource.

  • Common Examples:

    • Using stolen credentials or session hijacking to impersonate users.

    • DNS spoofing (redirecting users to malicious sites by altering DNS responses).

    • IP spoofing (forging an IP address to disguise malicious activity).

    • Email spoofing (forging sender addresses to deceive recipients).

  • Mitigation Strategies:

    • Implement strong authentication mechanisms (e.g., Multi-Factor Authentication - MFA).

    • Use digital certificates and cryptographic signing.

    • Enforce secure session management to prevent session hijacking.


2. Tampering (T) – Data Integrity Violations

  • Description: An attacker modifies data, system files, or configurations to manipulate system behavior, corrupt data, or bypass security controls.

  • Common Examples:

    • Modifying logs to cover tracks.

    • Altering transmitted data via a Man-in-the-Middle (MitM) attack.

    • Injecting malicious code into an application (e.g., SQL injection or code injection).

  • Mitigation Strategies:

    • Implement data integrity checks (e.g., hashing, cryptographic signing).

    • Enforce code integrity with signed and validated software.

    • Use secure communication protocols like TLS to prevent data tampering in transit.


3. Repudiation (R) – Denying Actions or Transactions

  • Description: An attacker (or even a legitimate user) denies performing an action, making it difficult to trace their activities and hold them accountable.

  • Common Examples:

    • A user denies making a financial transaction, but there’s no proof to validate or dispute the claim.

    • Attackers deleting or modifying log files to erase evidence of their actions.

  • Mitigation Strategies:

    • Implement audit logging and digital signatures to provide non-repudiation.

    • Use tamper-resistant logging mechanisms to prevent log deletion or modification.

    • Enforce strict access controls to prevent unauthorized users from altering logs.


4. Information Disclosure (I) – Unauthorized Data Exposure

  • Description: An attacker gains access to confidential or sensitive information that they are not authorized to view. This is one of the leading causes of data breaches.

  • Common Examples:

    • Data leaks exposing Personally Identifiable Information (PII), credit card numbers, or medical records.

    • Unencrypted communications exposing sensitive data in transit.

    • Directory traversal attacks allowing unauthorized access to restricted files.

    • Misconfigured cloud storage (e.g., AWS S3 buckets) exposing sensitive company data.

  • Mitigation Strategies:

    • Encrypt sensitive data at rest and in transit.

    • Implement role-based access controls (RBAC) and least privilege principles.

    • Regularly scan and monitor for data leaks (e.g., DLP solutions).

    • Use secure coding practices to prevent unintended data exposure (e.g., parameterized queries to avoid SQL injection).


5. Denial of Service (DoS) – Service Disruption

  • Description: An attacker disrupts or degrades the availability of a service, preventing legitimate users from accessing resources.

  • Common Examples:

    • Network-based DoS attacks, such as DDoS (Distributed Denial of Service) attacks that flood a server with traffic.

    • Application-layer DoS, such as sending excessive requests to overwhelm a system’s processing capabilities.

    • Resource exhaustion attacks, such as consuming all database connections.

  • Mitigation Strategies:

    • Deploy rate limiting and traffic filtering (e.g., Web Application Firewalls - WAFs).

    • Use DDoS protection services (e.g., Cloudflare, AWS Shield).

    • Implement auto-scaling and redundancy to absorb attack impact.


6. Elevation of Privilege (E) – Unauthorized Access Escalation

  • Description: An attacker gains higher-level access than they should have, potentially leading to full system compromise.

  • Common Examples:

    • Exploiting vulnerabilities in applications or OS to gain administrator (root) privileges.

    • Privilege escalation attacks, such as Windows token manipulation or Linux SUID exploits.

    • Bypassing authentication mechanisms to gain system-level access.

  • Mitigation Strategies:

    • Apply principle of least privilege (PoLP) for user and system permissions.

    • Regularly patch and update software to mitigate privilege escalation exploits.

    • Monitor and alert on unexpected privilege escalations using SIEM solutions.


Why STRIDE is Important for Security Teams

STRIDE is commonly used in application security and system threat modeling to help developers, security teams, and architects proactively identify security risks. By systematically assessing potential threats based on STRIDE, organizations can: βœ… Understand and anticipate security threats before they occur. βœ… Strengthen security controls by mapping mitigations to each STRIDE category. βœ… Improve security in software development by incorporating security-by-design principles. βœ… Enhance incident response and detection by knowing the types of attacks to monitor.

Conclusion

The STRIDE model provides a structured and effective way to categorize and address cybersecurity threats. By considering Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege, organizations can build stronger security defenses, reduce risk exposure, and improve overall cybersecurity posture.

πŸ›‘οΈ
⚠️