The unauthorized transfer of digital data from any environment is known as exfiltration of data (or extrusion of data). Once persistence is maintained on a compromised system, a set of tools can be utilized to exfiltrate data from highly secure environments.
In this section, we will explore different methods that attackers utilize to send files from internal networks to attacker-controlled systems.