Time and Attack Mapper AKA TA-Mapper – Time/Effort Estimator Tool For Blackbox Security Assessment


Time and Attack Mapper (alternatively known as TA-Mapper) is an effort estimator tool for blackbox security assessment (or Penetration Testing) of applications. This tool provides more accurate estimation when compared to rough estimation. Penetration testers who always has hard time explaining/justifying the efforts charged (or quoted) to their customers can find this tool handy by able to calculate efforts with greater accuracy required for application penetration testing.

In addition, this tool helps application pen-testers in itemizing their penetration testing efforts into micro-level and provides more clarity of their pen-testing activities. In future the author has plans to extend this tool ability to generate test cases.

The tool was written back in 2004 to support a freelance assessment. The author was intrigued to write this tool when he was asked by one of his Fortune 100 customer to justify efforts quoted against the activities for a penetration testing assignment. It not just helped him win the project but also help him educate the customer in knowing the activities involved at the micro-level. After making few changes in the tool the author thought it has been kept private too long and it’s the right time to share it with the world.

How it works

The strength of this tool lies in the background factors that were taken into consideration which helps in making an accurate estimation.

The tool makes it calculation based on various test types set against individual attacks. Almost all attacks performed against an application involve different factors in the way it is tested. Hence those different factors make it more complex to make a generic calculation of efforts. Around seven different test types were identified where different complex factors were mapped and grouped to come up with a mathematical formula for calculating efforts against individual attacks.

You can download TA-Mapper here:

TA-Mapper.zip

Or read more here.

Posted in: Hacking News, Security Software


Latest Posts:


Sooty - SOC Analyst All-In-One CLI Tool Sooty – SOC Analyst All-In-One CLI Tool
Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process.
UBoat - Proof Of Concept PoC HTTP Botnet Project UBoat – Proof Of Concept PoC HTTP Botnet Project
UBoat is a PoC HTTP Botnet designed to replicate a full weaponised commercial botnet like the famous large scale infectors Festi, Grum, Zeus and SpyEye.
LambdaGuard - AWS Lambda Serverless Security Scanner LambdaGuard – AWS Lambda Serverless Security Scanner
LambdaGuard is a tool which allows you to visualise and audit the security of your serverless assets, an open-source AWS Lambda Serverless Security Scanner.
exe2powershell - Convert EXE to BAT Files exe2powershell – Convert EXE to BAT Files
exe2powershell is used to convert EXE to BAT files, the previously well known tool for this was exe2bat, this is a version for modern Windows.
HiddenWall - Create Hidden Kernel Modules HiddenWall – Create Hidden Kernel Modules
HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers.
Anteater - CI/CD Security Gate Check Framework Anteater – CI/CD Security Gate Check Framework
Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of filenames, binaries, deprecated functions, staging variables and more.


Comments are closed.