The Cyber Threat Perspective cover image

Episode 65: Unsecured Credentials and Where To Find Them

The Cyber Threat Perspective

00:00

Securing Unsecured Credentials

This chapter explores techniques for identifying and managing unsecured credentials during penetration testing, emphasizing the vulnerabilities associated with unattended answer files and logon scripts. It highlights the critical security risks in IT systems, particularly in law firms, related to improper credential storage and permission settings.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app