
Sign up to save your podcasts
Or
This week we are taking a bit of a deep dive into an advanced attack technique to accomplish remote execution called “fetch and execute.” While there are different methods to accomplish the sort of thing what I am going to be focusing on is exploitation using a common Windows executable and installation file. Think of this as one of the touted “living off the land” attack techniques. It has value for compromise assessment methods as well as for threat hunting strategies...
4.9
6161 ratings
This week we are taking a bit of a deep dive into an advanced attack technique to accomplish remote execution called “fetch and execute.” While there are different methods to accomplish the sort of thing what I am going to be focusing on is exploitation using a common Windows executable and installation file. Think of this as one of the touted “living off the land” attack techniques. It has value for compromise assessment methods as well as for threat hunting strategies...
2,001 Listeners
369 Listeners
639 Listeners
370 Listeners
185 Listeners
1,017 Listeners
321 Listeners
414 Listeners
7,971 Listeners
188 Listeners
315 Listeners
73 Listeners
134 Listeners
43 Listeners
168 Listeners