Web application security - the fast guide 1.1 | Page 84
Chapter 4 - Be the attacker
P a g e | 84
4.16 Attack analyzing – feasibility & priority
3
Attack A
Attack B
1
2
Attack C
A
C
Complexity
weight
Possible attack scenario description
(%)
purpose (%)
At the end of this stage the attacker should have a list of possible attack scenarios
with priority for each attack type. The resulted priority is guided by the
complexity, purpose of attack and extra needed information.
Attacker should create a list of possible attacks along with estimated requested
resources t