SecurIT360’s Post

In this episode of Cyber Threat Perspective, Spencer Alessi and Brad Causey, CISSP discuss the various locations where unsecured credentials can be found, providing valuable insights and tips for IT admins and pen testers. Here's what you can find in this episode: • Probing custom web apps: Discover how pen testers can read log files and request certain files to uncover hidden credentials.    • Exploring application configuration files: Learn why it's crucial to search for .NET configuration files during pen testing for potential username and password exposures.    • Active Directory attribute hunt: Find out where sensitive data, including outdated credentials, can often be found in Active Directory and how PowerShell logs can help identify potential breaches.    • File shares: Delve into the world of file shares, where both sensitive data and unsecured credentials can be uncovered, making it a target for pen testers and red team members.    • Document Management Systems (DMS): Gain insights into the vulnerabilities and security risks associated with DMS and how users sometimes inadvertently use it as a password manager. Watch or listen to the full episode: https://lnkd.in/g4VzTft9 --- 🔒 Follow and connect with SecurIT360 for consulting, guidance, and implementation of security protocols for your organization, anchored by our 24/7 SOC.

Episode 65: Unsecured Credentials and Where To Find Them - Offensive Security Blog - SecurIT360

Episode 65: Unsecured Credentials and Where To Find Them - Offensive Security Blog - SecurIT360

https://offsec.blog

To view or add a comment, sign in

Explore topics