Épisodes

  • Episode 0x12
    Apr 3 2026

    In Episode 12 of Hack Dissection, Mike Lisi sits down with longtime friend and respected security educator Phillip Wylie — Chief Security Evangelist and Senior Consultant at Suzu Labs, and host of the Simply Offensive and The Phillip Wylie Show podcasts. Together, they look back on their early days pursuing the OSCP, discuss how offensive security has evolved over the last decade, and break down the changing realities of penetration testing in today’s environment.

    Phillip shares stories from the field, including a memorable web app penetration test involving SQL injection, weak credential practices, and the all-too-common misuse of risk acceptance. The conversation also explores the growing importance of web app testing, IoT attack paths, continuous remediation, and why foundational skills like networking, operating systems, and scripting still matter for anyone serious about building a career in cybersecurity.

    They also dig into mentorship, community involvement, conference speaking, and the future of the industry — from AI as a force multiplier to the value of staying adaptable in a field that never stops changing. Whether you’re an experienced practitioner or just breaking into offensive security, this episode is packed with practical insight, career wisdom, and real-world perspective from one of the community’s most generous voices.

    Afficher plus Afficher moins
    49 min
  • Episode 0x11
    Mar 9 2026

    In Episode 11 of Hack Dissection, Mike Lisi and Graham O’Donnell reunite in person after a brutal Q4 to break down what they’re seeing across penetration testing, external assessments, web apps, and internal networks heading into 2026.

    The conversation dives into why Q4 is always chaos in cybersecurity, how compliance deadlines shape client behavior, and why traditional external pen tests may be giving way to continuous monitoring and more practical security validation. Mike and Graham also unpack the real-world tradeoffs of scoping engagements, why collaboration with clients leads to better results, and the common misconceptions organizations still have about realism, downtime, and what offensive testing is actually meant to prove.

    Along the way, they share stories from the field — including strange external exposures, recurring misconfigurations, creative attack paths, and a wild case where a locked-down browser-based remote desktop environment led to full command-line access. It’s a candid, technical, and funny conversation about where offensive security is headed, what still works, and what organizations should really be testing.

    Afficher plus Afficher moins
    51 min
  • Episode 0x9
    Dec 8 2025

    In Episode 0x9 of Hack Dissection, host Mike Lisi flips the perspective from offense to defense with guest Cody Spooner, Principal Sales Engineer at Corelight.

    While Mike spends his days breaking into networks, Cody helps organizations defend them. Together they unpack how visibility, monitoring, and mindset intersect in modern cybersecurity — from the SOC Triad (SIEM, EDR, NDR) to the realities of MDR services, threat hunting, and alert fatigue.

    They dig into:

    • Why companies think they’re protected but still miss every alert
    • How to turn red-team findings into real defensive improvements
    • What threat hunting actually means (and why it’s not just a buzzword)
    • Lessons from ransomware incidents and tabletop exercises
    • How small businesses can build effective defenses without enterprise budgets

    If you’ve ever wondered what happens after the pen testers pack up, this conversation connects the offensive and defensive sides of the same fight — and shows how better collaboration can close the gap.

    Afficher plus Afficher moins
    1 h et 2 min
  • Episode 0x8
    Oct 31 2025

    In this episode of Hack Dissection, host Mike Lisi welcomes back Graham O’Donnell, Penetration Tester at Maltek Solutions, to pull back the curtain on what really happens during external and internal network assessments.

    From OSINT and subdomain enumeration to Nmap quirks and the chaos of inconsistent vulnerability data, Graham shares his raw, unfiltered process for finding weaknesses in the wild — plus the unexpected human side of hacking when tests get a little too real.

    Mike and Graham also discuss:

    • Automating and optimizing pen testing workflows
    • Credential reuse and why third-party breaches still matter
    • The ethics of exploring live environments
    • What it feels like to uncover personal data during an engagement

    Whether you’re a cybersecurity pro or just curious how ethical hackers think, this conversation offers a rare, behind-the-scenes look at the craft, the chaos, and the conscience of penetration testing.

    Afficher plus Afficher moins
    54 min
  • Episode 0x7: Invisible Architectures
    Sep 29 2025

    In this episode of Hack Dissection, host Mike Lisi sits down with Brandon Finton, MS, CISSP, CISM, President of Orion Secure, to unpack the evolving landscape of cybersecurity for businesses. From the early days of Cyber Defense Institute to the launch of Orion Secure, Brandon shares his journey and the shift from training to professional services. Together, Mike and Brandon dive into: 🔒 Why Written Information Security Policies (WISP) are the foundation of any program 💡 The difference between compliance reviews and real risk assessments 👩‍⚕️ Why no one—not even doctors, lawyers, or CEOs—should get a pass on MFA 📑 Governance, risk, and compliance (GRC) as living documents 🤖 How AI and chatbots are reshaping security—and the risks of giving them too much authority ⚠️ Real-world stories from penetration tests, ransomware cases, and phishing assessments Whether you’re a small business owner, IT leader, or simply curious about the state of cybersecurity, this episode sheds light on the challenges organizations face—and the practical steps they can take to strengthen their defenses.

    Afficher plus Afficher moins
    1 h et 2 min
  • Episode 0x6: The Performance of Preparedness
    Aug 15 2025

    In this episode of Hack Dissection, Mike Lisi is joined by cyber operations expert Paul Marco for a deep dive into the true purpose—and power—of tabletop exercises. From crisis simulations that reveal communication breakdowns to the uncomfortable truths leaders often overlook, Paul shares real-world stories that highlight the human factor in cybersecurity.

    You’ll hear why most organizations get tabletop exercises wrong, what really matters in the heat of a cyber crisis, and how to build muscle memory that actually holds up under pressure. Plus, Paul and Mike discuss the need for chaos, iteration, and yes—even a little embarrassment—to prepare your team for the moment the alarms go off.

    Whether you’re building your first incident response plan or you’ve lived through the fire, this episode offers practical insights, blunt truths, and a refreshing perspective on what real cybersecurity preparedness looks like.

    Afficher plus Afficher moins
    57 min
  • Episode 0x5: Model Behavior
    Jul 14 2025

    In this episode of Hack Dissection, hosts Mike Lisi and Graham O'Donnell sit down with red teamer, educator, and co-author of Redefining HackingWesley Thurner. What starts as a light-hearted conversation about soldering badges at Cactus Con quickly dives deep into red team tactics, AI exploitation, and the culture of CTF (Capture the Flag) competitions.

    Wesley shares real-world stories from his time in the military, his role on red teams at Amazon and Intuit, and his work organizing large-scale CTF events through ThreatSim and Red Team Village. From session hijacking and model poisoning to building MVP command-and-control tools with LLMs, this episode is packed with insights from the front lines of ethical hacking.

    Whether you're a cybersecurity pro, CTF player, or curious about how AI is reshaping the red team playbook, this conversation offers a rare look behind the curtain — with humor, humility, and a whole lot of practical wisdom.

    Topics covered:

    • Creative red team engagements involving AI platforms
    • How tainted training data can derail machine learning models
    • The evolving power (and danger) of prompt engineering
    • CTF design philosophy and community-first organizing
    • Why the simplest hacks still work in complex systems

    📕 Redefining Hacking is available now — and you might even catch Wesley signing copies at DEF CON’s Red Team Village.

    Afficher plus Afficher moins
    59 min
  • Episode 0x4: Cascading Effects
    Jun 13 2025

    In this episode of Hack Dissection, Mike Lisi is joined once again by ethical hacker Graham O’Donnell to unpack a memorable internal penetration test at a K-12 school district. What started with a forgotten, outdated Windows machine in a bus garage quickly escalated into full domain compromise—and revealed just how fragile infrastructure can be when one unpatched endpoint gets plugged back in.

    Mike and Graham walk through each stage of the assessment, from asset mapping to privilege escalation, showing how seemingly minor oversights can trigger devastating cascading effects. Along the way, they highlight how tools like BloodHound, EternalBlue, and Mimikatz played pivotal roles, and why school districts—despite tight budgets—must prioritize cyber hygiene.

    This episode dives into real-world tactics, practical takeaways for IT teams, and some wild detours into smartboards, PA systems, and Russian hacking forums.

    🔐 Key topics:

    • Pen testing vs. red teaming
    • Internal vs. external assessments
    • Risks of legacy systems in modern environments
    • Miscommunications that lead to major security gaps
    • The real-world implications of cached credentials

    If you’re a school IT admin, security pro, or just a fan of behind-the-scenes cybersecurity stories, this episode is a must-listen.

    🎧 Want to share your own pen test war story? Reach out: contact@malteksolutions.com

    Afficher plus Afficher moins
    48 min