
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
Why build custom tools instead of modifying existing ones?
Spencer and Brad explain when starting from scratch gives control over naming, behavior, and detection surface for pentests.
Play episode from 28:25
Transcript


