Oct. 24, 2023, 4:03 a.m. |

Digital Forensic Survival Podcast digitalforensicsurvivalpodcast.libsyn.com

This week we are taking a bit of a deep dive into an advanced attack technique to accomplish remote execution called “fetch and execute.” While there are different methods to accomplish the sort of thing what I am going to be focusing on is exploitation using a common Windows executable and installation file. Think of this as one of the touted “living off the land” attack techniques. It has value for compromise assessment methods as well as for threat hunting …

advanced attack called deep dive dive exploitation fetch file installation sort week windows

Cyber Security Engineer I

@ Fortress Security Risk Management | Cleveland, OH, United States

Senior DevSecOps Engineer

@ Wisk Aero | Remote United States

Vulnerable Adult Investigator - Vice President

@ JPMorgan Chase & Co. | Chicago, IL, United States

Consultant Réseaux IT Digital Impulse - H/F

@ Talan | Paris, France

DevSecOps Engineer (Onsite)

@ Accenture Federal Services | Arlington, VA

Senior Security Engineer

@ Minitab | State College, Pennsylvania, United States