The Cyber Threat Perspective cover image

Episode 75: Assume Breach - Extracting Maximum Value From Offensive Security Testing

The Cyber Threat Perspective

00:00

What misconfigurations arise after installing new software?

Spencer highlights insecure service permissions, files installed at root, and log files containing credentials that enable escalation.

Play episode from 27:19
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app