The Cyber Threat Perspective cover image

Episode 75: Assume Breach - Extracting Maximum Value From Offensive Security Testing

The Cyber Threat Perspective

00:00

Where are unsecured credentials typically found and how to find them?

Spencer points to file shares, scripts, document repositories and recommends simple searches or PowerShell to locate credentials.

Play episode from 30:35
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app