YoVDO

Questioning 42 - Where is the "Engineering" in the Social Engineering of Namespace Compromises?

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Social Engineering Courses Case Study Analysis Courses

Course Description

Overview

Explore the concept of social engineering in namespace compromises through a comprehensive analysis presented at BSidesLV 2016. Delve into case studies, including those of Matt Honan and Atin, and examine the power imbalance in security protocols. Investigate the problem space, identify common threads, and learn about formal engineering techniques applied to this field. Discover how stateful sessions are derived and gain insights into future developments in addressing namespace compromise vulnerabilities.

Syllabus

Introduction
Overview
Case Studies
Matt Honan
Atin
What happened at N
Power imbalance
Defining the problem
The problem space
Common threads
Security protocols
Formal engineering techniques
How did I derive the engineering
Stateful sessions
Future work


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network