From the course: Threat Modeling: Information Disclosure in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Metadata

Metadata

From the course: Threat Modeling: Information Disclosure in Depth

Start my 1-month free trial

Metadata

- [Instructor] Files have content, which is hopefully interesting. And they also have metadata, names, modification times, et cetera. Filenames signal that the contents are interesting. The directory structure can also be interesting. A path of layoffs/June/Alice is certainly of interest to Alice, even if it's a "your job is safe" note. Knowing that Disaster_Recovery_Phone_Tree hasn't been updated since 2012 is meaningful. There's no complete list. Host names, frequencies, time of day. The list of metadata is limited only by your imagination. And the list of ways to misuse it is limited first by availability and second by the adversary's imagination about how to make use of your metadata.

Contents