Subscribe to the CyberThreatPOV Podcast

Episode 156: Post Exploitation Tactics That Still Work in 2025

In this episode of The Cyber Threat Perspective, Tyler Roberts joins Spencer Alessi to break down the post-exploitation tactics that are still working in 2025. Get concrete insights from real-world pen tests and current threat intel on what attackers do once they’re inside an environment.

  • Credential access through file shares, SharePoint, and document repositories
  • Common password weaknesses and reuse pitfalls threat actors exploit
  • Persistence techniques like remote access tools and scheduled tasks
  • Defensive evasion methods including DLL hijacking, clearing logs, and masquerading
  • Lateral movement and exfiltration tactics—RDP, PS Remoting, SMB, and cloud storage abuse

Tune in to learn where attackers are winning—and what you need to watch out for.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Follow Spencer on social ⬇
Spencer’s Links: https://go.spenceralessi.com/links