SEARCH
TOOLBOX
LANGUAGES
May the data stay with you - Network Data Exfiltration Techniques.

May the data stay with you - Network Data Exfiltration Techniques.

From BruCON 2017

Revision as of 20:12, 5 July 2017 by Tom.Gilis (talk | contribs) (Protected "May the data stay with you - Network Data Exfiltration Techniques." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection.

During this workshop (2 hours) we will go through different network exfiltration methods and techniques (DNS, ICMP, TCP, UDP, HTTP, RDP, Cloud-app based and others). I will explain how they work, how to run them and what differences between are. It is a highly interactive workshop (I have dozen short labs already prepared) where you will be guided through the use of a set of open source tools powered by a short-fast theory.