FILE: materi-03.module

Threat Model dan Attack Vectors

Cara hacker berpikir. Threat model, attack surface, dan kategori serangan paling umum.

RUNTIME: 26m LEVEL: intermediate STATUS: ACTIVE
> THREAT MODELING $ STRIDE / DREAD framework [OK] Module loaded successfully [INFO] Ready for next stage

1. Apa Itu Threat Modeling

Proses sistematis identifikasi ancaman pada sistem. Bertanya: siapa yang mau serang, apa motivasi, bagaimana caranya. Output: prioritas mitigasi. Wajib dilakukan saat design sistem baru.

2. Framework STRIDE

Microsoft. 6 kategori ancaman: Spoofing (impersonate), Tampering (ubah data), Repudiation (sangkal), Information disclosure (leak), Denial of service, Elevation of privilege. Cek systematik tiap kategori.

3. Attack Surface

Semua titik dimana sistem bisa diserang. Web app, API endpoint, port terbuka, USB, social engineering target. Aturan: minimasi attack surface. Setiap fitur baru = attack surface baru.

4. Kategori Attacker

Script kiddie (amatir, pakai tools jadi). Hacktivist (politik). Organized crime (uang). Insider (karyawan). Nation state (APT, paling canggih). Setiap kategori punya kapabilitas dan motivasi berbeda.

5. Common Attack Vectors

Phishing email. Web app exploit (SQL injection, XSS). Network attack (MitM, sniffing). Malware (virus, ransomware). Physical access. Supply chain. Social engineering. Zero-day exploit.

Practical Mission

  1. Lakukan threat model untuk app sederhana
  2. Pelajari case nyata: SolarWinds attack
  3. Identifikasi attack surface laptop sendiri
  4. Kategorikan 10 attack populer ke STRIDE
  5. Buat threat model report 1 halaman

Recap Module