
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
What detection artifacts can obfuscation create?
Brad and Spencer discuss how obfuscation patterns and high-entropy strings themselves become indicators for defenders to flag.
Play episode from 23:36
Transcript


