The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

What detection artifacts can obfuscation create?

Brad and Spencer discuss how obfuscation patterns and high-entropy strings themselves become indicators for defenders to flag.

Play episode from 23:36
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app