All Episodes

Displaying 81 - 97 of 97 in total

Episode 80 — Social Engineering Patterns

This episode teaches social engineering as a predictable set of persuasion patterns that exploit trust, urgency, and process gaps to bypass technical controls. You’ll ...

Episode 81 — Mobile Attack Concepts

This episode explains mobile risk through a practical lens, focusing on how apps handle data, permissions, communication, and device posture rather than on device-spec...

Episode 82 — Specialized Systems: OT, NFC, RFID, Bluetooth

This episode introduces specialized environments and technologies that appear in scenario questions as constrained systems with unique risks and operational expectatio...

Episode 83 — AI-Related Attacks (High-Level)

This episode explains AI-related risks in scenario-friendly terms by treating them as input manipulation, access control, and data exposure problems rather than as mys...

Episode 84 — Automation and BAS Concepts

This episode teaches automation and breach-and-attack simulation concepts as structured ways to improve repeatability, measurement, and control validation without rely...

Episode 85 — Post-Exploitation Goals

This episode explains what to do after gaining access in a way that remains controlled, authorized, and focused on demonstrating meaningful impact rather than maximizi...

Episode 86 — Persistence Families

This episode teaches persistence as a risk and control topic, focusing on the main ways long-term access is maintained and how those mechanisms show up in scenario des...

Episode 87 — Credential Reuse and Expansion

This episode focuses on how credential reuse turns a single discovery into broad access, and how to reason about expansion safely under scope, safety, and evidence-han...

Episode 88 — Lateral Movement Logic

This episode teaches lateral movement as a purposeful decision process that depends on objectives, prerequisites, and trust boundaries, not as a default “keep moving” ...

Episode 89 — Pivoting Concepts

This episode explains pivoting as extending reach through a controlled foothold to access networks or services that are not directly reachable from your original posit...

Episode 90 — Common Lateral Paths (SMB/RDP/SSH/WinRM/WMI)

This episode teaches you to interpret common movement-enabling services conceptually so you can recognize what open ports and service clues imply about possible access...

Episode 91 — Staging and Exfiltration Concepts

This episode explains staging and exfiltration as controlled data-handling decisions that must balance evidence needs, confidentiality, monitoring, and engagement cons...

Episode 92 — Data Handling and Evidence

This episode teaches evidence handling as a core professional competency that protects clients, supports defensible findings, and reduces harm while still documenting ...

Episode 93 — Cleanup and Restoration

This episode focuses on cleanup and restoration as the final responsibility of a disciplined engagement, ensuring systems are left stable and risk is not increased by ...

Episode 94 — Building the Attack Narrative

This episode teaches you to build an attack narrative that connects technical actions to business meaning, turning scattered steps into a coherent story that supports ...

Episode 95 — Executive Summary That Doesn’t Suck

This episode teaches you to write executive summaries that drive decisions by focusing on top risks, business impact, and clear actions, rather than repeating technica...

Episode 96 — Final Exam Readiness Drill (Audio Practice)

This episode provides a structured audio drill designed to improve decision speed and consistency by repeatedly practicing the same recognition and selection steps use...

Broadcast by