The Cyber Threat Perspective
The Cyber Threat Perspective
The Cyber Threat Perspective·Nov 7, 2025·28m·Episode #156

Episode 156: Post-Exploitation Tactics That Still Work in 2025

Show notes

In this episode Spencer and Tyler discuss post-exploitation tactics that still work in 2025. The guys discuss everything from credential access techniques to defense evasion, lateral movement and even exfiltration.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://spenceralessi.com

Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.