Episode 44 — Spaced Retrieval Review: Adversary Tactics, Techniques, and Procedures Rapid Recall (Task 18)
In this episode, we’re going to strengthen recall by replaying the core adversary ideas you have already learned, but in a tighter, faster narrative that still feels complete and meaningful when you listen to it again later. Spaced retrieval works because your brain learns the act of remembering, and in cybersecurity, remembering the relationships between tactics, techniques, and procedures is more valuable than memorizing isolated terms. A tactic is the attacker’s high-level goal at a moment in time, like getting access, expanding control, staying hidden, or stealing data. A technique is the method used to achieve that goal, like credential theft or exploiting a weakness, and a procedure is the specific way the technique is carried out in a particular incident. Beginners often get stuck at procedures because they sound technical, but the deeper skill is recognizing tactics and techniques so you can predict what comes next even if the exact procedure changes. As you listen, pay attention to how the attacker’s goals create predictable sequences, and how defenders can interrupt those sequences at multiple points. The whole point is that the story should become familiar enough that you can recall it quickly under pressure.
Before we continue, a quick note: this audio course is a companion to our course companion books. The first book is about the exam and provides detailed information on how to pass it best. The second book is a Kindle-only eBook that contains 1,000 flashcards that can be used on your mobile device or Kindle. Check them both out at Cyber Author dot me, in the Bare Metal Study Guides Series.
Start by imagining the attacker before anything happens, because the earliest stage of an attack often begins with decisions about targets and opportunities. Some attackers act opportunistically, scanning widely for weak exposure or reused passwords, while others act with intent, studying a specific organization because of its data or role. That choice is influenced by motivation and capability, which you learned to evaluate when profiling threat actors. A financially motivated actor often values speed and scale, while an espionage-oriented actor often values stealth and selectivity. Even at this early moment, you can already predict different likely next moves. Opportunistic actors often begin with automated recon and credential attacks, while targeted actors often begin with careful research and believable messaging. This is why you never want to treat threat activity as random, because even basic attackers behave in patterns that reflect what they want. When you can connect motive to method, your recall becomes faster and your defensive thinking becomes calmer.
Reconnaissance is one of the most consistent tactics, and it shows up because attackers want information that reduces uncertainty. External recon might involve learning what systems are internet-facing, what login portals exist, what vendors are used, and what employee patterns can be exploited for social engineering. Internal recon can happen after a foothold is gained, and it often looks like exploring file shares, listing systems, checking permissions, and identifying where valuable data resides. Techniques in recon include scanning, probing, and collecting public information, but the real tactic is learning. Beginners sometimes dismiss recon as harmless noise, but recon is a warning that the attacker is building a map. Defenders interrupt recon by reducing unnecessary exposure, limiting information leakage, and watching for abnormal probing patterns. Even when you cannot stop all recon, you can make the attacker’s map less accurate and less useful by maintaining consistent hardened configurations and by limiting what systems reveal when queried. The retrieval cue here is simple: recon is learning, and learning precedes exploiting.
Initial access is another major tactic, and it is the moment where the attacker turns opportunity into entry. Techniques for initial access include phishing and other social engineering, exploiting unpatched public services, and credential-based attacks like credential stuffing and password spraying. Procedures vary widely, but the defender-friendly pattern is that attackers either trick a person, abuse a weakness, or reuse credentials. If the attacker’s motivation is fast profit, they may favor methods that scale, like mass phishing and credential stuffing. If the attacker is more targeted, they may craft a message that matches a role, an ongoing project, or a vendor relationship. Defenders interrupt initial access by strengthening authentication, reducing exposure, patching quickly, and improving user awareness of persuasion tactics. Beginners should remember that initial access does not usually mean full compromise, and that it can be an account foothold, an endpoint foothold, or an application foothold. The important part is that access becomes repeatable, and repeatable access is what allows the next tactics to unfold. When you recall initial access, recall the three big paths: human manipulation, technical weakness, and credential reuse.
Execution and persistence often follow quickly, because once an attacker gets in, they want to run actions and keep the ability to return. Execution is the tactic of running code or performing actions on a system, and persistence is the tactic of maintaining access even if the system restarts or defenders begin responding. Techniques for persistence can include creating new accounts, changing authentication settings, setting up email forwarding, or placing code that runs automatically. Beginners sometimes think persistence is always sophisticated, but it can be simple and still effective, especially in environments where account monitoring is weak. Attackers often build redundancy, creating multiple ways back in so the loss of one foothold does not end the operation. Defenders interrupt persistence by monitoring for account changes, limiting privileges, reviewing authentication configurations, and rapidly isolating suspicious endpoints. A strong retrieval anchor is that persistence is not the same as the original exploit, because you can remove the exploit and still have a persistent backdoor left behind. This is why eradication means removing all persistence mechanisms, not just cleaning one device. If you can recall that distinction, you are thinking like a responder.
Privilege escalation is a technique that supports multiple tactics, because it increases the attacker’s power and makes later steps easier. The tactic behind it is gaining higher control, and the technique is exploiting weaknesses or misconfigurations to obtain elevated privileges. Attackers do this because higher privilege allows actions like disabling security controls, accessing protected data, and managing other accounts. Privilege escalation is often enabled by poor patching, overly permissive settings, and weak separation between user activities and administrative activities. Defenders interrupt escalation by enforcing least privilege, hardening systems, patching known weaknesses, and monitoring privilege changes. Beginners should remember that privilege escalation often happens after initial access, but it can also be a path to persistence and to lateral movement. The retrieval cue is that privilege equals capability, and attackers seek capability because it multiplies their options. When you hear suspicious activity like sudden group membership changes or unusual admin actions, think escalation and investigate quickly.
Lateral movement is another repeated technique that supports the tactic of expanding reach within an environment. Attackers move laterally because the first system is rarely the final target, and the network’s connectivity can become the attacker’s roadway. Techniques include using stolen credentials to log into other systems, leveraging trust relationships, and using administrative pathways that are too broadly available. Procedures might involve remote access sessions, file share exploration, and internal scanning, but the tactic is always the same: spread and reach valuable systems. Defenders interrupt lateral movement with segmentation, strong credential hygiene, limiting where privileged credentials are used, and monitoring for unusual internal connections. Beginners should remember that lateral movement often looks like normal internal traffic unless you have baselines and context. That is why living off the land matters, because attackers often prefer legitimate tools and protocols to avoid detection. When you recall lateral movement, recall the idea of pathways, and ask whether the network design intentionally limits those pathways.
Living off the land is a technique that supports the tactic of evasion, because it helps attackers blend into normal activity. Instead of deploying obvious malware, attackers use built-in tools, normal administrative functions, and legitimate protocols to achieve their goals. The procedure might look like common maintenance actions, but the pattern differs in timing, scope, and sequence. Beginners sometimes feel discouraged by this idea because it suggests attackers can hide in plain sight, but the defender advantage is that misuse creates behavioral anomalies. Defenders interrupt living off the land by controlling privileged tool use, requiring admin actions to occur from approved environments, and monitoring for patterns that do not match normal operations. The retrieval cue is that legitimate does not always mean safe, and that context is what turns an action from normal to suspicious. When you see lots of admin-like actions from a user endpoint, at an unusual time, across many systems, that is the kind of pattern that deserves escalation. Living off the land is a reminder that detection is often about behavior, not only about known bad files.
Exfiltration is the tactic where the attacker extracts value by moving data out of the environment, and it often represents the moment when harm becomes permanent. Techniques include compressing data, encrypting it, staging it in temporary locations, and transferring it to external destinations, often using channels that blend into normal traffic. Some exfiltration is slow and quiet, and some is fast after the attacker gains high privilege, but both require discovery of where the data is stored. Defenders interrupt exfiltration by protecting and classifying sensitive data, limiting access, monitoring for unusual access patterns, and watching for outbound anomalies that suggest data movement. Beginners should remember that exfiltration can happen before other visible damage, such as ransomware, because data theft increases leverage. The retrieval cue here is that data movement is often preceded by unusual data access and staging activity, so detection opportunities exist before the data leaves. When you recall exfiltration, recall the idea of direction, because the important signal is data leaving its boundary in a way that does not fit business purpose. If you can track that direction, you can prioritize containment actions.
Impact is the tactic where the attacker causes the outcome they want, and it can take different forms depending on motivation. Financially motivated actors may cause impact through ransomware, fraud, or data sale, while politically motivated actors may cause impact through disruption or espionage outcomes. A D D o S attack is impact through availability loss, B E C is impact through deception-driven financial loss, ransomware is impact through denied access and extortion, and data theft is impact through confidentiality loss. Beginners should recall that impact is sometimes delayed, because attackers may spend time preparing before triggering disruption. Defenders reduce impact through resilience planning, backups, segmentation, strong verification processes for payments, and rapid containment capabilities. Impact is also where communication and decision-making matter, because organizations must choose how to respond under pressure. The retrieval cue is that impact is the visible result, but the earlier stages often contain more opportunities to stop the chain. When you recall impact, also recall that prevention and detection earlier can prevent the need for crisis decisions later.
Threat intelligence evaluation ties into this review because defenders often learn about tactics and techniques through reports and alerts. The four anchors for evaluating intelligence are credibility, context, timeliness, and actionability, and they help you decide what information should influence your defenses. Strategic intelligence helps you understand which tactics and motivations are trending, operational intelligence helps you anticipate active campaigns, and tactical indicators help with short-term blocking and detection. Beginners should remember that indicators can expire quickly while techniques and tactics remain useful longer. This means the best recall skill is often recognizing the pattern of an attack rather than memorizing a specific address or file fingerprint. When you evaluate intelligence well, you avoid chasing noise and instead focus on improving controls that disrupt common tactics, like strengthening authentication, reducing exposure, and improving monitoring for lateral movement and exfiltration. The retrieval cue here is that intelligence is only valuable if it leads to a decision or action, not if it simply increases anxiety. When you combine intelligence evaluation with the stage model, you become better at predicting what an attacker will attempt next.
To wrap up this rapid recall narrative, keep the flow in your head as a repeatable chain: recon to learn, initial access to enter, execution and persistence to stay, privilege escalation to gain power, lateral movement to expand reach, living off the land to evade, and exfiltration to steal value, followed by impact that may be theft, disruption, or extortion. Procedures will change from incident to incident, but the tactics and techniques remain surprisingly consistent, which is why spaced retrieval works so well in cybersecurity learning. The defender’s advantage is that every stage has break points: you can reduce exposure and information leakage, strengthen authentication, patch and harden systems, segment networks, control privileges, monitor behavior, and protect sensitive data with classification and careful access. When you can recall this chain quickly, you can make better triage decisions and communicate more clearly during incidents. The goal is not to feel paranoid, but to feel oriented, because orientation is what allows calm, effective defense. Keep replaying this narrative over time, and you will find that the patterns become automatic, which is exactly what spaced retrieval is designed to achieve.