Join Spencer and Brad from SecurIT360’s Offensive Security Group as they dive into the intricacies of evading detection during internal pentests. Learn the techniques and thought processes used by both pen testers and threat actors to stay under the radar.
- Differentiation between evasion and bypassing
- The role of known good tools in evasion
- Customizing and obfuscating existing pen test tools
- Using PowerShell and C# for stealthy operations
- Employing creative, low-tech solutions to avoid detection
Tune in to discover how these strategies can help in both offensive and defensive security contexts.
Resources
- (Jun 1, 2021) Evadere Classifications – detection & response focus
- Defense Evasion, Tactic TA0005 – Enterprise | MITRE ATT&CK® – controls focus
- (Mar 22, 2024) Atomics on a Friday – Evade or Bypass – edr focus
Blog:Â https://offsec.blog/
Youtube:Â https://www.youtube.com/@cyberthreatpov
Twitter:Â https://twitter.com/cyberthreatpov
Work with Us:Â https://securit360.com