The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

How do you customize offensive tools to avoid detection?

Spencer explains renaming functions, removing comments, and obfuscating open-source tools to evade static signatures and detections.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app