SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "May the data stay with you - Network Data Exfiltration Techniques."

Difference between revisions of "May the data stay with you - Network Data Exfiltration Techniques."

From BruCON 2017

Jump to: navigation, search
(Created page with "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (2 hours)...")
 
m (Protected "May the data stay with you - Network Data Exfiltration Techniques." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
 
(No difference)

Latest revision as of 20:12, 5 July 2017

Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection.

During this workshop (2 hours) we will go through different network exfiltration methods and techniques (DNS, ICMP, TCP, UDP, HTTP, RDP, Cloud-app based and others). I will explain how they work, how to run them and what differences between are. It is a highly interactive workshop (I have dozen short labs already prepared) where you will be guided through the use of a set of open source tools powered by a short-fast theory.