From the course: Threat Modeling: Tampering in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Tampering with local storage

Tampering with local storage

From the course: Threat Modeling: Tampering in Depth

Start my 1-month free trial

Tampering with local storage

- [Narrator] We've talked about libraries and libraries are an important case. But don't limit your thinking to libraries. Executables can be tampered with. Lambda functions can be tampered with. Containers can be tampered with. Kubernetes can't be tampered with because Kubernetes is magic. Actually, it's not that magical. It can be tampered with. Someone who gets privileged access can tamper with files. Those can be data, they can be configuration files. Modifying configuration files can be as impactful as modifying the code. It's easier too. File tampering is easiest to visualize on the local system but all files are subject to tampering.

Contents