Certified: The CISSP Audio Course
Episode 86: Threats to IAM: Replay, Pass-the-Hash, Credential Stuffing
23 Jun 2025
Identity systems are high-value targets, and attackers use increasingly sophisticated techniques to exploit them. This episode examines key IAM-related attack vectors, including replay attacks, pass-the-hash, credential stuffing, brute-force, and phishing-based compromise. We explain how these attacks work, the conditions that enable them, and the defenses needed to detect and prevent them. Controls discussed include session binding, MFA, rate limiting, password hygiene, and advanced behavioral analytics. CISSPs must understand not just how to build IAM systems, but how to defend them against persistent and evolving threats.
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
#158 - Szilágyi Tamás: A húszas éveid arra valók, hogy legalább egyszer becsődölj
21 Dec 2025
Mindenségit!
Tödliche Ernte
21 Dec 2025
Schattenakte - Der Fall der Woche
Origines de Stars : Shai Gilgeous Alexander ! (Calendrier Avent #21)
21 Dec 2025
Le Basket Lab (NBA Podcast)
The BEST XI in the 2025 West Indies Championship
21 Dec 2025
Caribbean Cricket Podcast