Hack Dissection
Podcast Description
🔍 Welcome to Hack Dissection, where we pull back the curtain on cybersecurity, ethical hacking, and the digital threats shaping our world. Hosted by Mike Lisi, founder of Maltek Solutions and an expert in Hacking For Good, this podcast takes you behind the scenes of real-world cyber attacks, penetration testing, and security strategies that keep businesses and individuals safe. 💻 What You’ll Get in Every Episode: ✅ Deep dives into ethical hacking and cybersecurity trends ✅ Breakdowns of real cyber threats—how they happen & how to stop them ✅ Insider stories from security professionals, red teamers, and industry experts ✅ Practical tips to strengthen your security and protect your data 📢 Subscribe & Stay Ahead of Cyber Threats! If you're a business owner, IT professional, or just someone who wants to understand cybersecurity without the jargon, you’re in the right place.
Podcast Insights
Content Themes
The podcast explores several key themes including ethical hacking, penetration testing, and emerging cybersecurity trends, with episodes providing insights into real-world cyber attacks, security strategies, and vulnerabilities. For example, episodes break down the unseen security gaps businesses face and real case studies on tool-assisted exploitation in technology, drawing lessons on how to enhance digital safety.

🔍 Welcome to Hack Dissection, where we pull back the curtain on cybersecurity, ethical hacking, and the digital threats shaping our world. Hosted by Mike Lisi, founder of Maltek Solutions and an expert in Hacking For Good, this podcast takes you behind the scenes of real-world cyber attacks, penetration testing, and security strategies that keep businesses and individuals safe. 💻 What You’ll Get in Every Episode: ✅ Deep dives into ethical hacking and cybersecurity trends ✅ Breakdowns of real cyber threats—how they happen & how to stop them ✅ Insider stories from security professionals, red teamers, and industry experts ✅ Practical tips to strengthen your security and protect your data 📢 Subscribe & Stay Ahead of Cyber Threats! If you’re a business owner, IT professional, or just someone who wants to understand cybersecurity without the jargon, you’re in the right place.
In this episode of Hack Dissection, Mike Lisi is joined once again by ethical hacker Graham O’Donnell to unpack a memorable internal penetration test at a K-12 school district. What started with a forgotten, outdated Windows machine in a bus garage quickly escalated into full domain compromise—and revealed just how fragile infrastructure can be when one unpatched endpoint gets plugged back in.
Mike and Graham walk through each stage of the assessment, from asset mapping to privilege escalation, showing how seemingly minor oversights can trigger devastating cascading effects. Along the way, they highlight how tools like BloodHound, EternalBlue, and Mimikatz played pivotal roles, and why school districts—despite tight budgets—must prioritize cyber hygiene.
This episode dives into real-world tactics, practical takeaways for IT teams, and some wild detours into smartboards, PA systems, and Russian hacking forums.
🔐 Key topics:
- Pen testing vs. red teaming
- Internal vs. external assessments
- Risks of legacy systems in modern environments
- Miscommunications that lead to major security gaps
- The real-world implications of cached credentials
If you’re a school IT admin, security pro, or just a fan of behind-the-scenes cybersecurity stories, this episode is a must-listen.
🎧 Want to share your own pen test war story? Reach out: [email protected]

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.