tag:blogger.com,1999:blog-18555569.post113448552623418870..comments2023-06-04T08:07:03.642-03:00Comments on HEXALE (security & reverse engineering): Attack Trees are .. mm.. fun...hernanhttp://www.blogger.com/profile/12754761735106237455noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-18555569.post-1134665542373471462005-12-15T13:52:00.000-03:002005-12-15T13:52:00.000-03:00Threat modelling your applications sounds like a g...Threat modelling your applications sounds like a good idea...however creating attack trees in order to predict 73rr0 attacks and falling towers..coooome on! Worst thing is that the example probably brought a couple leads..Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18555569.post-1134602208593536182005-12-14T20:16:00.000-03:002005-12-14T20:16:00.000-03:00Agreed, the specific example is at the very least ...Agreed, the specific example is at the very least stupid. But generally attack trees are an interesting modelling methodology.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18555569.post-1134509361109709212005-12-13T18:29:00.000-03:002005-12-13T18:29:00.000-03:00Thanks for the comment. Anyways, the point was the...Thanks for the comment. Anyways, the point was the hilarous comment about they being able to predict the 9/11 attack :).<BR/><BR/>I'm personally no fan of attack trees anyways :).hernanhttps://www.blogger.com/profile/12754761735106237455noreply@blogger.comtag:blogger.com,1999:blog-18555569.post-1134496055865387712005-12-13T14:47:00.000-03:002005-12-13T14:47:00.000-03:00There are open source alternatives that are pretty...There are open source alternatives that are pretty good, like for example FreeMind:<BR/><BR/>http://freemind.sourceforge.net/wiki/index.php/Main_Page<BR/><BR/>Although not specifically designed to model attack trees, FreeMind can be used for exactly that purpose. I have used it many times in the past to create comprehensive threat models for a wide variety of application domains.Anonymousnoreply@blogger.com