The Cyber Threat Perspective

(replay) Common Pentest Findings That Shouldn't Exist in 2025

Oct 10, 2025
Tyler Roberts, an offensive security practitioner, sheds light on critical pentest findings still plaguing organizations in 2025. Discussion covers the alarming persistence of weak passwords, risks from corporate emails used for third-party signups, and the dangers of plaintext credentials on file shares. Tyler emphasizes the importance of updating outdated TLS protocols and tackling local admin password reuse. The conversation also highlights vulnerabilities in on-prem Exchange systems and the need for better control over public-facing protocols. This is a must-listen for anyone in IT security!
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Ban Weak And Reused Passwords

  • Enforce banned password lists and block known-bad credentials in Entra or AD to stop weak/reused passwords.
  • Use Lithnet AD Password Protection or SpecOps for on-prem AD and enable Entra password blacklist for cloud accounts.
ADVICE

Stop Using Corporate Emails For Consumer Apps

  • Avoid signing up for third-party consumer services with corporate emails to reduce leaked credentials from unrelated breaches.
  • Detect shadow SaaS by scanning email gateways and using Defender for Cloud Apps or content-filtering tools.
ADVICE

Audit File Shares And Enforce Least Privilege

  • Regularly audit file shares and enforce least-privilege ACLs using security groups for share access.
  • Educate users where to store secrets and remove broad read access to prevent plaintext credentials exposure.
Get the Snipd Podcast app to discover more snips from this episode
Get the app