We have already covered some basic techniques in the reverse shell chapter. Let's do a quick revision of how these techniques can be used to transfer data from a victim machine to us.
Exfiltration basics
Exfiltration via Netcat
As previously discussed, this is not the best way to transmit data as the data is transmitted in plaintext, which makes it easily detectable.
Exfiltration via OpenSSL
We also saw another way to transfer data via OpenSSL using commands, as shown by the following, to first generate the certificate and then use that certificate to transfer data...