Exfiltration

从零开始学习AWS黑客技术,成为专家 htARTE(HackTricks AWS红队专家)

支持HackTricks的其他方式:

Try Hard Security Group


常见的白名单域名用于信息泄露

查看https://lots-project.com/以找到常见的可被滥用的白名单域名

复制&粘贴Base64

Linux

Windows

HTTP

Linux

Windows

上传文件

HTTPS 服务器

FTP

FTP服务器(Python)

FTP服务器(NodeJS)

FTP服务器 (pure-ftp)

Windows 客户端

SMB

Kali作为服务器

或者使用samba创建一个smb共享:

Windows


Exfiltration

Techniques

  1. Exfiltration Over C2 Channel: Utilize the existing command and control channel to exfiltrate data.

  2. Exfiltration Over Alternative Protocol: Use alternative protocols such as DNS, ICMP, or HTTP to exfiltrate data.

  3. Exfiltration Over Unencrypted Protocols: Leverage unencrypted protocols like FTP, Telnet, or HTTP to exfiltrate data.

  4. Exfiltration Over Encrypted Protocols: Utilize encrypted protocols like HTTPS or SSH to exfiltrate data.

  5. Exfiltration Over Ingress Filtering: Bypass egress filtering by exfiltrating data over allowed ingress channels.

Tools

  • Netcat: A versatile networking utility for reading from and writing to network connections.

  • PowerShell: A task automation framework for configuring systems and automating tasks.

  • Certutil: Command-line utility for managing certificates.

  • Bitsadmin: A tool to create and manage transfer jobs using Background Intelligent Transfer Service (BITS).

  • FTP: File Transfer Protocol for transferring files between a client and server on a network.

  • Wget: A command-line utility for downloading files from the web.

  • Curl: A tool for transferring data with URLs.

  • SMBClient: A tool for accessing shared folders.

  • RDP: Remote Desktop Protocol for remote access to Windows systems.

  • WMIC: Command-line tool for Windows Management Instrumentation.

  • Reg: Command-line utility for working with the registry.

  • Schtasks: Command-line tool for managing scheduled tasks.

  • Bitsadmin: Command-line tool for managing Background Intelligent Transfer Service (BITS) jobs.

  • Vssadmin: Command-line tool for managing Volume Shadow Copy Service.

  • Wevtutil: Command-line tool for managing event logs.

  • Forfiles: Command-line tool for batch processing files.

  • Robocopy: Command-line tool for copying files and directories.

  • Diskshadow: Command-line tool for managing shadow copies.

  • Net: Command-line tool for managing network resources.

  • Tasklist: Command-line tool for listing running processes.

  • Taskkill: Command-line tool for terminating processes.

  • Regsvr32: Command-line tool for registering and unregistering DLLs.

  • Regini: Command-line tool for modifying registry permissions.

  • Regsvcs: Command-line tool for registering and unregistering .NET components.

  • Regsvr32: Command-line tool for registering and unregistering DLLs.

  • Regsvr32: Command-line tool for registering and unregistering DLLs.

SCP

攻击者必须运行SSHd。

SSHFS

如果受害者有SSH,攻击者可以将受害者的目录挂载到攻击者的计算机上。

网络通信

/dev/tcp

从受害者下载文件

上传文件至受害者

感谢 @BinaryShadow_

ICMP

SMTP

如果您可以将数据发送到SMTP服务器,您可以使用Python创建一个SMTP来接收数据:

TFTP

在XP和2003中默认情况下(在其他系统中需要在安装过程中显式添加)

在Kali中,启动TFTP服务器

Python中的TFTP服务器:

受害者中,连接到Kali服务器:

PHP

使用 PHP 一行代码下载文件:

VBScript

Visual Basic Script (VBScript) 是一种基于对象的脚本语言,通常用于 Windows 环境中。VBScript 可以通过多种方式进行数据泄露,包括通过网络传输数据,将数据写入文件,或者通过电子邮件发送数据。

受害者

Debug.exe

debug.exe程序不仅允许检查二进制文件,还具有从十六进制重建它们的能力。这意味着通过提供一个二进制文件的十六进制表示,debug.exe可以生成该二进制文件。然而,重要的是要注意debug.exe有一个组装文件大小限制为64 kb

DNS

Try Hard Security Group

从零开始学习AWS黑客技术,成为专家 htARTE (HackTricks AWS Red Team Expert)!

支持HackTricks的其他方式:

最后更新于