Introduction
Network Infrastructure
Data Exfiltration
Exfiltration Using TCP socket
Exfiltration using SSH
Exfiltrate using HTTP(S)
Exfiltration using ICMP
Exfiltration over DNS
DNS Tunneling
Conclusion
Living Off Trusted Sites (LOTS) Projectarrow-up-right
Last updated 2 years ago