Paul's Security Weekly (Audio) cover image

Effective Operational Outcomes - Ken Dunham - PSW #847

Paul's Security Weekly (Audio)

00:00

Exploiting EDR Silencer and Advanced Attack Techniques

This chapter explores the EDR Silencer tool, originally meant for red teaming, now misused by malicious actors to evade detection from EDR systems. The discussion extends to the vulnerabilities in Linux security, innovative attack methods such as file-less malware, and unconventional ways to gain root access. Additionally, it critiques the clarity of information surrounding advanced hacking exploits, emphasizing the complexity and necessity of technical expertise in executing effective cyber attacks.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app