
#3 - Introducing The Adversary Toolbox: PsExec. Plus cybersecurity startup founders roundtable.
The Cybersecurity Defenders Podcast
00:00
Exploring the Legitimate Use and Detection of PSExec
Exploring the details of PSExec usage, from command line parameters to detection tricks like tracking registry key creation upon first use. The chapter underscores the potential for detection and response with tools like Lima Charlie despite threat actors utilizing PSExec for malicious activities.
Transcript
Play full episode