Objective: Degrade/Disable Application, Bypass Flow Control, or Leak Config
[[Attacker's Goal]]
|
|
[[1. Bypass Sentinel's Protection]]
|
-------------------------------------------------
| |
[[1.1 Rule Manipulation]] [1.3 Client-Side Bypass] (If client-side is used) | | --------------------- | | | | [[1.1.1 Modify Rules]] [[1.1.2 Delete Rules]] | via Dashboard/API]] via Dashboard/API]] [1.3.1 Manipulate Client]
Attack Tree Path: Path 1
Attacker's Goal ===> 1. Bypass Sentinel's Protection ===> 1.1 Rule Manipulation ===> 1.1.1 Modify Rules via Dashboard/API
Attack Tree Path: Path 2
Attacker's Goal ===> 1. Bypass Sentinel's Protection ===> 1.1 Rule Manipulation ===> 1.1.2 Delete Rules via Dashboard/API
Attack Tree Path: Path 3
Attacker's Goal ===> 1. Bypass Sentinel's Protection ===> 1.3 Client-Side Bypass ===> 1.3.1 Manipulate Client (If client-side is used)