The Cyber Threat Perspective cover image

(Replay) How We Evade Detection During Internal Pentests

The Cyber Threat Perspective

00:00

Why do low-tech changes like renaming and string edits work?

Brad and Spencer discuss simple renaming, string modification, and monitoring naming conventions and LDAP volumes to detect misuse.

Play episode from 18:30
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app