Temptation
The Randori Temptation model provides a realistic adversarial assessment of the likelihood a Service (and therefore the associated Target, Hostname, IP, etc.) will be attacked. These Temptation scores are used internally by the Randori Attack Team to prioritize vulnerability research and by the Attack Platform to target attacks — it is not a theoretical model but one backed by results and put into action.
When it comes to managing your attack surface, a critical risk factor you need to be able to accurately assess is how likely an adversary is to target a specific asset. Existing models focus almost exclusively on vulnerabilities, ignoring the multitude of other attributes a real adversary is likely to consider before targeting an asset. Randori’s adversarial-informed model is grounded in the team’s decades of experience conducting high-end red team engagements and the thousands of attack results continuously gathered by the Randori Attack Platform.
The 6 Factors of Temptation
-
Applicability - level of adoption
-
Criticality - importance of function
-
Enumerability - precision of detection
-
Exploitability - susceptibility to weakness
-
Research Potential - ease of development
-
Post Exploitat Potential - usefulness after compromise
Applicability
-
High: The service is in common use and has few competitive services. A market may exist for vulnerabilities for this service due to its popularity alone.
-
Medium: This service is at or near its end-of-life, or the service is likely to be found only in a particular market segment or industry.
-
Low: The service is deployed in few circumstances, is significantly out-of-date, is past its end-of-life, or is unique to this detected instance.
Criticality
-
High: The service is intrinsically associated with an integrity boundary. It is intended to protect or separate services or data.
-
Medium: The service might be a component of an integrity boundary or could be configured to protect other services, but this function may not be detectable.
-
Low: The service is not intrinsically associated with an integrity boundary
Enumerability
-
High: Specific version or configuration information was discovered for this service. This is useful for determining the applicability of vulnerabilities.
-
Medium: Major or major & minor version information was discovered for this service. Associations with vulnerabilities may have low accuracy.
-
Low: No version or configuration information was discovered for this service. Without probes, the applicability of vulnerabilities is uncertain.
Exploitability
-
High: Exploitable vulnerabilities exist for this version. A reliable exploit may be public or available from private parties.
-
Medium: Weaknesses, including potentially exploitable vulnerabilities may exist for this version. Public exploits are not widely available.
-
Low: Known weaknesses, including vulnerabilities, are either nonexistent or of low impact.
Research Potential
-
High: This software is widely available or easy to obtain. Proof-of-concept exploits or significant research is available.
-
Medium: This software is available and some amount of prior research may be available. A history of impactful weakness may exist.
-
Low: This software is unavailable, is difficult to obtain, or is prohibitively expensive for most researchers. Public research is limited.
Post Exploit Potential
-
High: The post exploitation environment is well known. Tooling is typically available and defenses are usually unlikely to be present on these systems.
-
Medium: The post exploitation environment is known, and tooling varies. Attackers may expect typical defensive capabilities or endpoint protections.
-
Low: This service runs in an esoteric environment, such as a proprietary embedded systems, for which little or no tooling exists.
Temptation Scores and the Randori API
-
Critical: >=40 and <=100
-
High: >=30 and <40
-
Medium: >=15 and <30
-
Low: >=0 and <15
-
NOTE: If we can't identify the specific Service Vendor / Name and only know the protocol( example: "Unknown, HTTPS Service"), they will be still be scored, but the resulting score will almost always be
Lowas unknown services are not as interesting to attackers.
-
-
In Review Temptation:
null[no score listed - the service is still under investigation by our Hacker Operations Center]
-
High: 4-5
-
Medium: 2-3
-
Low: 0-1