
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
How do attackers use trusted and signed tools to evade detection?
Spencer explains using known-good tools, LOLbins, and signed binaries (AD Explorer, Pincastle) and why abnormal host context is suspicious.
Play episode from 13:17
Transcript


