Last updated 1 year ago
Introduction
Network Infrastructure
Data Exfiltration
Exfiltration Using TCP socket
Exfiltration using SSH
Exfiltrate using HTTP(S)
Exfiltration using ICMP
Exfiltration over DNS
DNS Tunneling
Conclusion
Living Off Trusted Sites (LOTS) Project