pushsecurity / saas-attacks

Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
https://pushsecurity.com/blog/saas-attack-techniques/
Creative Commons Attribution 4.0 International
943 stars 61 forks source link

Adding Guest user access misconfiguration #64

Open CharanRoot opened 2 months ago

CharanRoot commented 2 months ago

Adding new Guest user access misconfiguration in Initial Access section.

jukelennings commented 2 months ago

Hi @CharanRoot. First of all, thanks for making the time to make a new technique submission! This is definitely relevant information in the SaaS space.

My main concern with the current version though is that it is "weakness-focused" as opposed to "attack-focused". When first making the matrix, we tried as best we could to keep it focused on attack techniques rather than security/configuration weaknesses. For example, "Credential stuffing" as opposed to "weak/shared/compromised passwords". Obviously, there are sometimes 1:1 mappings between attack techniques and exploitable weaknesses, but that's not always the case.

This might be as simple as some naming and wording tweaks, but perhaps there are also some wider points to consider to turn this into more of an attack-focused technique?