The Cybersecurity Defenders Podcast cover image

#3 - Introducing The Adversary Toolbox: PsExec. Plus cybersecurity startup founders roundtable.

The Cybersecurity Defenders Podcast

00:00

Exploring the Legitimate Use and Detection of PSExec

Exploring the details of PSExec usage, from command line parameters to detection tricks like tracking registry key creation upon first use. The chapter underscores the potential for detection and response with tools like Lima Charlie despite threat actors utilizing PSExec for malicious activities.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app