mal-lang / coreLang

A probabilistic attack simulation language for the (abstract) IT domain
https://mal-lang.org/coreLang/
Other
11 stars 13 forks source link

Credential hashing #17

Closed skatsikeas closed 2 years ago

skatsikeas commented 4 years ago

Can we model Credential hashing?

skatsikeas commented 4 years ago

I think we can! This is close to what Max did in the OAuth test model. He used two Credential instances and one Data. The (hashed) Credentials are contained inside Data and Data is in turn encrypted using the other Credential instance which is the hashing key.

skatsikeas commented 4 years ago

I just found a note I had about credential hashing. What we want to model is: authentication tokens that can be passed around or used in place

andrewbwm commented 2 years ago

Implemented in #63.