Offensive perspective
From the attacker's point of view, I will cover several ways to exfiltrate data out of the victim network. Specifically, I will start with some tips for harnessing anonymity networks to help protect the attacker's identity and operations. I will also cover custom internal anonymity networks we've designed for competition environments, such as CCDC. Later, I will cover clearing up your tools and eliminating your presence on the attacker network. I will also provide sample code that can stop an agent from executing with time-based triggers, such that even components that are forgotten about won't run after the operation's conclusion.
Exfiltration
Getting data out of a target environment is as important as getting into the environment itself. When planning an offensive operation, it's important to plan how to get your target information out. Sometimes it is very easy, and you can download the data directly through the C2 channel...