Data Exfiltration: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
Line 6: Line 6:


== Tools and Resources ==
== Tools and Resources ==
* Exfiltration: https://book.hacktricks.xyz/generic-methodologies-and-resources/exfiltration
* Exfiltration techniques: https://book.hacktricks.xyz/generic-methodologies-and-resources/exfiltration
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (42:45 - Exfiltrating files)
* [https://enlacehacktivista.org/index.php?title=Pronico#Video_Timeline Guacamaya] (42:45 - Exfiltrating files)
* Zip up a directory quickly for easy exfiltration: https://github.com/thoemmi/7Zip4Powershell
* Zip up a directory quickly for easy exfiltration: https://github.com/thoemmi/7Zip4Powershell
* Rclone: https://rclone.org/#about
* Rclone: https://rclone.org/#about
* WinSCP: https://github.com/winscp/winscp
* WinSCP: https://github.com/winscp/winscp

Revision as of 01:06, 29 July 2023

There are many different ways to exfiltrate data using many different protocols and tools. Your objective should be to exfiltrate as much as possible without being seen by the blue team/sysadmins.

Microsoft Exchange

Tools and Resources