
The Cyber Threat Perspective Episode 2: How to Find Passwords on Network Shares Before Attackers Do
Aug 10, 2022
The discussion dives into the criticality of recognizing artifacts in network file shares during internal penetration tests. Discover the interplay between user behavior and access permissions that can create vulnerabilities. Learn how sensitive information, like passwords and credentials, often lurks on file shares, waiting to be exploited. The speakers highlight the dangers of reused credentials and reveal tools like PowerView that can enhance network security. Valuable best practices for auditing permissions and safeguarding sensitive data are shared throughout.
Chapters
Transcript
Episode notes
1 2 3 4 5
Intro
00:00 • 2min
Navigating User Behavior and Access Permissions in Cybersecurity
02:12 • 1min
Uncovering Sensitive Information in Internal Penetration Tests
03:40 • 3min
Uncovering Vulnerabilities: The Risks of Reused Credentials and Mismanaged Configurations
07:08 • 2min
Securing Network Shares with PowerView
09:15 • 7min
