Cybersecurity Fundamentals — Hard
Key points
- LotL attacks use built-in system tools like PowerShell and WMI
- They mimic normal administrative actions to avoid detection
- Signature-based detection struggles to identify these attacks
Ready to go further?
Related questions
