
Episode 2: How to Find Passwords on Network Shares Before Attackers Do
The Cyber Threat Perspective
00:00
Uncovering Vulnerabilities: The Risks of Reused Credentials and Mismanaged Configurations
This chapter explores methods for identifying sensitive information in penetration testing, focusing on the dangers of reused passwords and unattended installation files. It underscores the importance of robust security practices to mitigate risks within network environments.
Play episode from 07:08
Transcript


