The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

How do attackers use trusted and signed tools to evade detection?

Spencer explains using known-good tools, LOLbins, and signed binaries (AD Explorer, Pincastle) and why abnormal host context is suspicious.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app