Chapter

Gaining Unauthorized Access to Networks
listen on Spotify
15:13 - 19:58 (04:44)

The hosts discuss how easy it can be for a red teamer to gain access to a network and its sensitive information simply by physically plugging in a computer.

Clips
Red teamers can gain access to sensitive data by infiltrating networks and utilizing full administrator abilities, even accessing emails and files, exposing vulnerabilities that need to be addressed.
15:13 - 17:55 (02:42)
listen on Spotify
Cybersecurity
Summary

Red teamers can gain access to sensitive data by infiltrating networks and utilizing full administrator abilities, even accessing emails and files, exposing vulnerabilities that need to be addressed.

Chapter
Gaining Unauthorized Access to Networks
Episode
Ep 40: No Parking
Podcast
Darknet Diaries
The speaker shares that a lot of valuable information can be found in boxes and files of old companies and that this information can potentially be sold to competitors.
17:57 - 19:58 (02:00)
listen on Spotify
Business Intelligence
Summary

The speaker shares that a lot of valuable information can be found in boxes and files of old companies and that this information can potentially be sold to competitors. They also mention the importance of having access to diagrams and data for things like gas and electricity.

Chapter
Gaining Unauthorized Access to Networks
Episode
Ep 40: No Parking
Podcast
Darknet Diaries