
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
How do attackers use trusted and signed tools to evade detection?
Spencer explains using known-good tools, LOLbins, and signed binaries (AD Explorer, Pincastle) and why abnormal host context is suspicious.
Transcript
Play full episode


