
Episode 156: Post-Exploitation Tactics That Still Work in 2025
The Cyber Threat Perspective
00:00
Defense evasion: DLL abuse and process injection
Spencer and Tyler describe DLL hijacking/proxying and process injection as common evasion techniques found in reports.
Play episode from 20:14
Transcript


