The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

Why build custom tools instead of modifying existing ones?

Spencer and Brad explain when starting from scratch gives control over naming, behavior, and detection surface for pentests.

Play episode from 28:25
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app