
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
00:00
Credential leaks on file shares and backups
Tyler and Spencer discuss examples of exposed credential files and VMDK backups that allowed offline credential extraction and cracking.
Play episode from 03:48
Transcript


