πŸ“ Overview

What it is: The unauthorized transfer of sensitive information from a target network to an attacker-controlled system. Target Phase: attack postexploitation Operating System: Cross-platform

βš™οΈ Core Methods

  • HTTPS/Web Services: High-speed, encrypted, and blends with standard web traffic.
  • DNS Tunneling: Using tools like dnscat2 or iodine. Extremely stealthy but very low bandwidth.
  • ICMP Tunneling: Hiding data inside β€œPing” packets. Often blocked by firewalls but useful if ICMP is allowed outbound.
  • Cloud Storage: Uploading data directly to legitimate services (S3 buckets, Dropbox) to bypass domain-based filtering.

πŸ’» Common CLItool options

ToolProtocolNote
curl / wgetHTTP/SUsed to POST data to a remote server.
dnscat2DNSHigh stealth, low speed.
rcloneMultipleSyncs data to cloud providers; very common in ransomware attacks.

🏷️ Tags

attack postexploitation Exfiltration NetworkSecurity DataDiscovery PenTestPlus CLItool