SEARCH
TOOLBOX
LANGUAGES
May the data stay with you - Network Data Exfiltration Techniques.

May the data stay with you - Network Data Exfiltration Techniques.

From BruCON 2017

Revision as of 23:22, 1 July 2017 by Larry (talk | contribs) (Created page with "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (2 hours)...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection.

During this workshop (2 hours) we will go through different network exfiltration methods and techniques (DNS, ICMP, TCP, UDP, HTTP, RDP, Cloud-app based and others). I will explain how they work, how to run them and what differences between are. It is a highly interactive workshop (I have dozen short labs already prepared) where you will be guided through the use of a set of open source tools powered by a short-fast theory.