Clip

Hacking a Network through Weak Passwords and Remote Desktops
Adam hops from one system to another using weak passwords, remoting into a computer in the IT workshop, but finds nothing of value. He then uses an IP scanner to obtain a list of all computers in the network for further exploration.