
Episode 121: How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
Evolving Techniques for Evading Detection in Internal Pentests
This chapter explores advanced techniques for evading detection during internal penetration tests, highlighting the decrease in efficacy of traditional methods. It also underscores the significance of subtle tactics like token duplication and PowerShell remoting for lateral movement, advocating for enhanced monitoring to identify atypical activities.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.