Breakpoint Blog

Benjamin Mossé • 04 Oct 2025

The Always-More-Access Loops

Attackers think in Access Loops.

I call the entire process the Always-More-Access Loops (AMAL).

Start with a any type of access (see diagram).
Figure out how to gain more access.
Repeat - until you’ve reached the crown jewels.

It’s how Red Teamers turn “a bug” into “domain admin.” It’s the repetition of persistence, creativity, critical thinking, and problem-solving.

Here’s the opportunity for defenders: think in Anti-Access Loops.

Your goal isn’t just to block the one type or one instance of access by working off a checklist. It’s to prevent the attacker from chaining Access Loops altogether.

A practical starting point:

List all the ways someone could keep expanding access in your environment.

Then, one by one, deploy Anti-Access Loops.

When defenders start thinking in Access Loops, they can anticipate how attackers will behave - and stop them before cyber incidents spiral out of control.

Recent Blog Posts

Benjamin Mossé • 16 Oct 2025

Manage Legacy IT Risks

The 2024-25 ASD Threat Report highlights legacy IT as one of the top risks facing organizations t...
Benjamin Mossé • 15 Oct 2025

Restrict Administrative Privileges

Restricting admin privileges is one of the most common recommendations in cybersecurity. And like...
Benjamin Mossé • 14 Oct 2025

Action <> Reaction

Last month, I was speaking with a security team that had rolled out Security Awareness Training. ...