
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
Why do low-tech changes like renaming and string edits work?
Brad and Spencer discuss simple renaming, string modification, and monitoring naming conventions and LDAP volumes to detect misuse.
Play episode from 18:30
Transcript


