
Effective Operational Outcomes - Ken Dunham - PSW #847
Paul's Security Weekly (Audio)
Exploiting EDR Silencer and Advanced Attack Techniques
This chapter explores the EDR Silencer tool, originally meant for red teaming, now misused by malicious actors to evade detection from EDR systems. The discussion extends to the vulnerabilities in Linux security, innovative attack methods such as file-less malware, and unconventional ways to gain root access. Additionally, it critiques the clarity of information surrounding advanced hacking exploits, emphasizing the complexity and necessity of technical expertise in executing effective cyber attacks.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.