Data Exfiltration

Introduction

Network Infrastructure

Data Exfiltration

Exfiltration Using TCP socket

Exfiltration using SSH

Exfiltrate using HTTP(S)

Exfiltration using ICMP

Exfiltration over DNS

DNS Tunneling

Conclusion

Living Off Trusted Sites (LOTS) Project

Last updated