Episode 55 — Name Resolution and Relay Concepts

This episode teaches you how name resolution confusion and authentication relay behaviors can enable credential capture or reuse, and how these scenarios differ from brute force guessing. You’ll learn how name resolution works at a practical level, how spoofing can redirect requests, and how relay behavior forwards authentication attempts to real services in a way that can result in unintended access. We’ll cover common scenario indicators such as unexpected authentication prompts, repeated credential requests, or traffic targeting unexpected hosts, and how segmentation, hardening, and strong protocol settings reduce these opportunities. You’ll practice reasoning through a scenario where a workstation authenticates to an unexpected destination, deciding what evidence matters and what the safest next validation step should be. By the end, you’ll be able to explain spoofing versus relay clearly, choose mitigations like stronger signing requirements and protocol hardening, and write report language that ties the behavior to a concrete control improvement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 55 — Name Resolution and Relay Concepts
Broadcast by