The extrusion of data from any environment in an unauthorized manner from a computer is referred to as exfiltration of data. Once persistence is maintained on the compromised system, depending on whether the goal set during the start of the Red Teaming Exercise or penetration testing was to exfiltrate the company secrets and demonstrate, the following set of tools can be utilized to exfiltrate data from highly secure environments. In this section, we will explore different methods that attackers could utilize to send files from internal networks to attacker-controlled systems.
Exfiltration of data
Using existing system services (Telnet, RDP, and VNC)
Now we will discuss some of the easy techniques to quick grab the files in...