I find it kind of funny that you talk about Kathy sharing pictures on social media. Talking about about laptops. While in the video there are 2 laptops on the screen and network rack behind you.
CEH 11 Sharing info on social media
I like where your head is at and you make an interesting observation. 2 exceptions.
- The video you're watching isn't on social media.
- While the laptops are real, the rack behind us isn't.
At the end of the day, while there is a lot of nuance to this topic, the major takeaway from this video should be that we just need to be careful/mindful about what we allow in the public space and as an ethical hacker we should be looking for that public info to see if it can weaponized in some way, and if so, we use that knowledge to strengthen our defenses. To that, I think you get it, so good job!
I will just add to that by saying that keep in mind that it is very difficult to police everyone, everything, everywhere, and all the time to make sure that no sensitive info is posted publicly, so be sure to factor that into your assessment as well as the possible risk (likelihood x impact) to your org when reporting your findings.
Cheers, and thanks for your comments