Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Privilege escalation
Applied sciences
Computer engineering
Computer architecture
Operating systems
Graph Chatbot
Related lectures (9)
Login to filter by course
Login to filter by course
Reset
Sudo Bug Exploitation: Demo
Demonstrates exploiting a bug in Sudo to run commands as root when restricted.
Digital Proximity Tracing: SwissCovid Protocol
Covers the SwissCovid protocol for digital proximity tracing and access control mechanisms like DAC and MAC.
SSO Wars: The Token Menace
Covers SAML signature verification, resolving security keys, token handlers vulnerabilities, and a Sharepoint privilege escalation demo.
Principles II: Complete Mediation, Open Design, Separation of Privilege
Discusses the 'complete mediation', 'open design', and 'separation of privilege' principles to enhance system security.
Establishing a Security Policy: Threat Models and Principles
Explores security policy establishment, threat models, and principles, with practical exercises on state-level adversaries and young hackers.
Security Principles: Least Privilege, Common Mechanism, Acceptability
Explores security principles like least privilege, common mechanism, and user acceptability to enhance system protection.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Interrupts
Explores interrupts as a mechanism for abstraction and multiplexing in operating systems, covering handling, processing, and initialization.
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Previous
Page 1 of 1
Next