
Sign up to save your podcasts
Or
This week I’m talking about Regsvcs /Regasm exploitation, which is a Windows tactic attackers use to evade defense mechanisms and execute code. Specifically, this technique can be used to bypass process whitelisting and digital certificate validation. I'll break down some interpretation methods that may be used to identify such exploitation....
4.9
6161 ratings
This week I’m talking about Regsvcs /Regasm exploitation, which is a Windows tactic attackers use to evade defense mechanisms and execute code. Specifically, this technique can be used to bypass process whitelisting and digital certificate validation. I'll break down some interpretation methods that may be used to identify such exploitation....
1,982 Listeners
364 Listeners
640 Listeners
370 Listeners
180 Listeners
1,017 Listeners
316 Listeners
408 Listeners
7,945 Listeners
189 Listeners
312 Listeners
76 Listeners
128 Listeners
43 Listeners
168 Listeners