The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

How can modifying binaries evade signatures?

Spencer describes hex-editing strings in signed binaries, breaking signatures, and the trade-offs of resigning versus simple string changes.

Play episode from 16:34
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app