Episode Player
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
The Cyber Threat Perspective
Episode 156: Post-Exploitation Tactics That Still Work in 2025
Nov 07, 2025
Season 1
Episode 156
SecurIT360
In this episode Spencer and Tyler discuss post-exploitation tactics that still work in 2025. The guys discuss everything from credential access techniques to defense evasion, lateral movement and even exfiltration.
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://spenceralessi.com
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.