
Sign up to save your podcasts
Or
This week I’m talking about Regsvcs /Regasm exploitation, which is a Windows tactic attackers use to evade defense mechanisms and execute code. Specifically, this technique can be used to bypass process whitelisting and digital certificate validation. I'll break down some interpretation methods that may be used to identify such exploitation....
4.9
6161 ratings
This week I’m talking about Regsvcs /Regasm exploitation, which is a Windows tactic attackers use to evade defense mechanisms and execute code. Specifically, this technique can be used to bypass process whitelisting and digital certificate validation. I'll break down some interpretation methods that may be used to identify such exploitation....
2,001 Listeners
369 Listeners
639 Listeners
370 Listeners
185 Listeners
1,016 Listeners
321 Listeners
414 Listeners
7,971 Listeners
188 Listeners
315 Listeners
73 Listeners
134 Listeners
43 Listeners
168 Listeners