
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
When should you avoid noisy techniques like SAM dumping?
Spencer suggests avoiding SAM/LSASS dumping on protected hosts and using alternatives like token duplication or ticket theft instead.
Transcript
Play full episode


