15:00
Stop
CEH - Malware Threats - Anti-Malware Software
Advanced
1/15
During a penetration test on a client's network, you encounter a system with a strict security policy that monitors process creation and has enhanced security features. You need to execute your password dumping tool but standard execution is failing due to Endpoint Detection and Response (EDR) software. Which technique would most likely succeed in running your tool while evading detection?
Advanced