Questioning 42 - Where is the "Engineering" in the Social Engineering of Namespace Compromises?
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the concept of social engineering in namespace compromises through a comprehensive analysis presented at BSidesLV 2016. Delve into case studies, including those of Matt Honan and Atin, and examine the power imbalance in security protocols. Investigate the problem space, identify common threads, and learn about formal engineering techniques applied to this field. Discover how stateful sessions are derived and gain insights into future developments in addressing namespace compromise vulnerabilities.
Syllabus
Introduction
Overview
Case Studies
Matt Honan
Atin
What happened at N
Power imbalance
Defining the problem
The problem space
Common threads
Security protocols
Formal engineering techniques
How did I derive the engineering
Stateful sessions
Future work
Taught by
BSidesLV
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network