15:00
Stop
CEH - System Hacking - Executing Applications
Advanced
1/15
During a penetration test on a client's network, you encounter a system with a strict security policy that monitors process creation and has enhanced security features. You need to execute your password dumping tool but standard execution is failing due to Endpoint Detection and Response (EDR) software. Which technique would most likely succeed in running your tool while evading detection?
Advanced