Web application security - the fast guide 1.1 | Page 84

Chapter 4 - Be the attacker P a g e | 84 4.16 Attack analyzing – feasibility & priority 3 Attack A Attack B 1 2 Attack C A C Complexity weight Possible attack scenario description (%) purpose (%) At the end of this stage the attacker should have a list of possible attack scenarios with priority for each attack type. The resulted priority is guided by the complexity, purpose of attack and extra needed information. Attacker should create a list of possible attacks along with estimated requested resources t