
Episode 65: Unsecured Credentials and Where To Find Them
The Cyber Threat Perspective
00:00
Securing Unsecured Credentials
This chapter explores techniques for identifying and managing unsecured credentials during penetration testing, emphasizing the vulnerabilities associated with unattended answer files and logon scripts. It highlights the critical security risks in IT systems, particularly in law firms, related to improper credential storage and permission settings.
Transcript
Play full episode