AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Exploring Credential Gathering Tactics and Vulnerabilities
This chapter explores the methods used by threat actors for credential gathering, including password spraying and share spelunking. It highlights the vulnerabilities of both traditional file shares and modern platforms like SharePoint and Slack, emphasizing the dangers of poor credential management.