The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

When should you avoid noisy techniques like SAM dumping?

Spencer suggests avoiding SAM/LSASS dumping on protected hosts and using alternatives like token duplication or ticket theft instead.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app