
Episode 5: Common High Risk Findings on Internal Penetration Tests & How to Mitigate Them
The Cyber Threat Perspective
00:00
Legacy System Vulnerabilities and Relay Attacks
This chapter explores the security risks tied to default configurations in legacy systems, particularly relay attacks, and highlights the common unawareness of clients about these dangers. It also discusses the drawbacks of outdated services and protocols, as well as the critical need for stronger password practices in small to medium business environments.
Play episode from 20:50
Transcript


