From the course: Threat Modeling: Information Disclosure in Depth
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Metadata
From the course: Threat Modeling: Information Disclosure in Depth
Metadata
- [Instructor] Files have content, which is hopefully interesting. And they also have metadata, names, modification times, et cetera. Filenames signal that the contents are interesting. The directory structure can also be interesting. A path of layoffs/June/Alice is certainly of interest to Alice, even if it's a "your job is safe" note. Knowing that Disaster_Recovery_Phone_Tree hasn't been updated since 2012 is meaningful. There's no complete list. Host names, frequencies, time of day. The list of metadata is limited only by your imagination. And the list of ways to misuse it is limited first by availability and second by the adversary's imagination about how to make use of your metadata.