In the rapidly evolving world of mobile technology, security is a paramount concern. One of the key components that help maintain this security is the Authentication Center (AuC). For those new to mobile technology, understanding the role of the AuC can provide valuable insights into how mobile networks protect user data and ensure secure communication. Read More …
Tag: authentication
lsassy: An Offensive Security Tool
lsassy is an open-source tool developed by Login-Sécurité, designed specifically for offensive security practices. Available on GitHub, lsassy expertly facilitates the extraction of credential data from the memory of the Local Security Authority Subsystem Service (LSASS) process in Windows environments. Key Features Primarily, lsassy is adept at dumping credentials stored within LSASS, which is a Read More …
SAML – Security Assertion Markup Language
In today’s digital landscape, where online security is paramount, understanding the tools that help protect our identities is essential. One such tool is SAML, which stands for Security Assertion Markup Language. While the acronym may sound complex, SAML plays a crucial role in enhancing identity security, especially in environments where multiple applications and services are Read More …
Quick Note :: Attribute Based Access
We then end up with two main classifications of access control: Role-Based Access Control (RBAC). Define the role for the access to data, eg Policy = Subject (AND/OR) Role –> Permissions. Attribute-Based Access Control (ABCL). Define attributes eg Policy = User (role, nationality) AND/OR Resource (department, owner) AND/OR Action AND/OR Context (time, IP, location) -> Read More …