Lépjen offline állapotba az Player FM alkalmazással!
Ep. 4 – Exposed Secrets & Silent Takeovers: How Misconfigurations Open the Door to Attackers
Manage episode 468818150 series 3643227
Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.
In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?
Listen now to learn how attackers exploit these mistakes—and how you can prevent them.
Chapters:
00:00 - INTRO
01:00 - FINDING #1 - How a Forgotten File Exposed Private Repositories
06:37 - FINDING #2 - How Misconfigured Permissions Led to Full System Takeover
14:35 - FINDING #3 - The Credentials That Gave Access to a Network Switch
20:31 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
Fejezetek
1. INTRO (00:00:00)
2. FINDING #1 - How a Forgotten File Exposed Private Repositories (00:01:00)
3. FINDING #2 - How Misconfigured Permissions Led to Full System Takeover (00:06:37)
4. FINDING #3 - The Credentials That Gave Access to a Network Switch (00:14:35)
5. OUTRO (00:20:31)
13 epizódok
Manage episode 468818150 series 3643227
Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach.
In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what can be done to stop them?
Listen now to learn how attackers exploit these mistakes—and how you can prevent them.
Chapters:
00:00 - INTRO
01:00 - FINDING #1 - How a Forgotten File Exposed Private Repositories
06:37 - FINDING #2 - How Misconfigured Permissions Led to Full System Takeover
14:35 - FINDING #3 - The Credentials That Gave Access to a Network Switch
20:31 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
Fejezetek
1. INTRO (00:00:00)
2. FINDING #1 - How a Forgotten File Exposed Private Repositories (00:01:00)
3. FINDING #2 - How Misconfigured Permissions Led to Full System Takeover (00:06:37)
4. FINDING #3 - The Credentials That Gave Access to a Network Switch (00:14:35)
5. OUTRO (00:20:31)
13 epizódok
Minden epizód
×Üdvözlünk a Player FM-nél!
A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.