
Sign up to save your podcasts
Or
This week we are taking a bit of a deep dive into an advanced attack technique to accomplish remote execution called “fetch and execute.” While there are different methods to accomplish the sort of thing what I am going to be focusing on is exploitation using a common Windows executable and installation file. Think of this as one of the touted “living off the land” attack techniques. It has value for compromise assessment methods as well as for threat hunting strategies...
4.9
6161 ratings
This week we are taking a bit of a deep dive into an advanced attack technique to accomplish remote execution called “fetch and execute.” While there are different methods to accomplish the sort of thing what I am going to be focusing on is exploitation using a common Windows executable and installation file. Think of this as one of the touted “living off the land” attack techniques. It has value for compromise assessment methods as well as for threat hunting strategies...
360 Listeners
628 Listeners
367 Listeners
179 Listeners
1,014 Listeners
314 Listeners
393 Listeners
7,855 Listeners
187 Listeners
314 Listeners
6 Listeners
117 Listeners
33 Listeners
158 Listeners
14 Listeners