Exfiltration
Try Hard Security Group

常见的白名单域名用于信息泄露
查看https://lots-project.com/以找到常见的可被滥用的白名单域名
复制&粘贴Base64
Linux
Windows
HTTP
Linux
Windows
上传文件
Python 模块 uploadserver:
HTTPS 服务器
FTP
FTP服务器(Python)
FTP服务器(NodeJS)
FTP服务器 (pure-ftp)
Windows 客户端
SMB
Kali作为服务器
或者使用samba创建一个smb共享:
Windows
Exfiltration
Techniques
Exfiltration Over C2 Channel: Utilize the existing command and control channel to exfiltrate data.
Exfiltration Over Alternative Protocol: Use alternative protocols such as DNS, ICMP, or HTTP to exfiltrate data.
Exfiltration Over Unencrypted Protocols: Leverage unencrypted protocols like FTP, Telnet, or HTTP to exfiltrate data.
Exfiltration Over Encrypted Protocols: Utilize encrypted protocols like HTTPS or SSH to exfiltrate data.
Exfiltration Over Ingress Filtering: Bypass egress filtering by exfiltrating data over allowed ingress channels.
Tools
Netcat: A versatile networking utility for reading from and writing to network connections.
PowerShell: A task automation framework for configuring systems and automating tasks.
Certutil: Command-line utility for managing certificates.
Bitsadmin: A tool to create and manage transfer jobs using Background Intelligent Transfer Service (BITS).
FTP: File Transfer Protocol for transferring files between a client and server on a network.
Wget: A command-line utility for downloading files from the web.
Curl: A tool for transferring data with URLs.
SMBClient: A tool for accessing shared folders.
RDP: Remote Desktop Protocol for remote access to Windows systems.
WMIC: Command-line tool for Windows Management Instrumentation.
Reg: Command-line utility for working with the registry.
Schtasks: Command-line tool for managing scheduled tasks.
Bitsadmin: Command-line tool for managing Background Intelligent Transfer Service (BITS) jobs.
Vssadmin: Command-line tool for managing Volume Shadow Copy Service.
Wevtutil: Command-line tool for managing event logs.
Forfiles: Command-line tool for batch processing files.
Robocopy: Command-line tool for copying files and directories.
Diskshadow: Command-line tool for managing shadow copies.
Net: Command-line tool for managing network resources.
Tasklist: Command-line tool for listing running processes.
Taskkill: Command-line tool for terminating processes.
Regsvr32: Command-line tool for registering and unregistering DLLs.
Regini: Command-line tool for modifying registry permissions.
Regsvcs: Command-line tool for registering and unregistering .NET components.
Regsvr32: Command-line tool for registering and unregistering DLLs.
Regsvr32: Command-line tool for registering and unregistering DLLs.
SCP
攻击者必须运行SSHd。
SSHFS
如果受害者有SSH,攻击者可以将受害者的目录挂载到攻击者的计算机上。
网络通信
/dev/tcp
从受害者下载文件
上传文件至受害者
感谢 @BinaryShadow_
ICMP
SMTP
如果您可以将数据发送到SMTP服务器,您可以使用Python创建一个SMTP来接收数据:
TFTP
在XP和2003中默认情况下(在其他系统中需要在安装过程中显式添加)
在Kali中,启动TFTP服务器:
Python中的TFTP服务器:
在受害者中,连接到Kali服务器:
PHP
使用 PHP 一行代码下载文件:
VBScript
Visual Basic Script (VBScript) 是一种基于对象的脚本语言,通常用于 Windows 环境中。VBScript 可以通过多种方式进行数据泄露,包括通过网络传输数据,将数据写入文件,或者通过电子邮件发送数据。
受害者
Debug.exe
debug.exe程序不仅允许检查二进制文件,还具有从十六进制重建它们的能力。这意味着通过提供一个二进制文件的十六进制表示,debug.exe可以生成该二进制文件。然而,重要的是要注意debug.exe有一个组装文件大小限制为64 kb。
DNS
Try Hard Security Group

最后更新于