
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
00:00
Why credential access is the first priority
Spencer frames credential access as the main post-compromise goal and lists common repositories attackers search for credentials.
Play episode from 02:16
Transcript


