Published on October 8th, 2019 📆 | 4716 Views ⚑
0Cyberattack Series: Regsvr32 + UAC Bypass
https://www.ispeech.org
One of the more common perceptions of cyberattacks is that “getting hacked” usually involves malicious software or files. The truth is, cyber attackers can easily gain traction in an attack without using any malicious software at all. One of the ways they can do this is by using your computer against itself.
Watch as Security Engineer Will demonstrates how attackers "live off the land" using built-in resources and bypass traditional security with a few common techniques.
Follow our Cyberattack Series content on www.infogressive.com/cyberattack-series/ and make sure to register for our upcoming #SecurityInAction webinar!
The Cyberattack Series theme song is:
Cyber Sunset by William Pearson
2019-10-08 21:03:29
source
Gloss