The Cyber Threat Perspective cover image

Episode 2: How to Find Passwords on Network Shares Before Attackers Do

The Cyber Threat Perspective

00:00

Uncovering Vulnerabilities: The Risks of Reused Credentials and Mismanaged Configurations

This chapter explores methods for identifying sensitive information in penetration testing, focusing on the dangers of reused passwords and unattended installation files. It underscores the importance of robust security practices to mitigate risks within network environments.

Play episode from 07:08
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app