
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
How can modifying binaries evade signatures?
Spencer describes hex-editing strings in signed binaries, breaking signatures, and the trade-offs of resigning versus simple string changes.
Play episode from 16:34
Transcript


