Very Lazy Tech 👾File Transfer Cheatsheet: Windows and LinuxFile transfer is a critical component in post-exploitation, penetration testing, and red teaming. Different environments require specific…Oct 30
Abdur Rehman RehanImmersive Labs | Cyber Million: Incident Response | Exfiltration Over Alternative Protocol |…Room Link.Feb 23
Meena VyasHunting Cloud Exfiltration In Jupyter NotebooksBy Meena Vyas, Craig ChamberlainSep 10Sep 10
MITRE CalderaTesting Data Exfiltration with MITRE Caldera™Authors: Brent Harrell, Melanie Chan, Hojin Han, Kristin Voss, Ganesh Danke, Lauren Ji, Olivia Brobin, & Kate EspritSep 30, 2022Sep 30, 2022
InAardvark InfinitybyAardvark InfinityBrowser Cookie Exfiltration: Covert Data Storage and Transmission via Cookies#### IntroductionAug 28Aug 28
Very Lazy Tech 👾File Transfer Cheatsheet: Windows and LinuxFile transfer is a critical component in post-exploitation, penetration testing, and red teaming. Different environments require specific…Oct 30
Abdur Rehman RehanImmersive Labs | Cyber Million: Incident Response | Exfiltration Over Alternative Protocol |…Room Link.Feb 23
MITRE CalderaTesting Data Exfiltration with MITRE Caldera™Authors: Brent Harrell, Melanie Chan, Hojin Han, Kristin Voss, Ganesh Danke, Lauren Ji, Olivia Brobin, & Kate EspritSep 30, 2022
InAardvark InfinitybyAardvark InfinityBrowser Cookie Exfiltration: Covert Data Storage and Transmission via Cookies#### IntroductionAug 28
Shantanu KhandelwalRed Team: Using SharpChisel to exfil internal networkDuring many Red Team Assessment, we use multiple agents to connect to our target network infrastructure. These agents connect to different…Jun 8, 20201
Fahri YeşilFrom Infiltration to Exfiltration: Exploring the Cyber Kill ChainIn our modern, interconnected society, where both our personal lives and businesses heavily rely on digital technologies, the ever-present…Oct 21, 20233
AstroKrypTechTHM — DNS EXFILTRATION SETUPTHM ROOM: https://tryhackme.com/room/dnsmanipulationMar 16, 2021