Learn what kind of information is sent out during an attack and why attackers need to protect it in this video.
- [Instructor] In the Lockheed Martin Cyber Kill Chain model…of a cyberattack, data exfiltration is one…of the possible actions taken in the final stage…of the attack.…Exfiltration covers the automated actions taken…by malware to send data out…to the attacker's collection point,…and it covers manual techniques used…by an intruder to pull data back from an attack session.…One of the main ways to detect a cyberattack is…to identify the data being exfiltrated,…and so, concealment is an important characteristic…of any serious exfiltration technique.…
This is particularly important…where documents being exfiltrated are classified.…It may trigger alarms if classification…markings are detected on the network.…Detecting sensitive data isn't the only way…exfiltration alarms can be set off.…The protocols used may trigger alarms either on their own…or when correlated with the packet destinations,…and so, exfiltration may need to be camouflaged.…Attacks will often try to understand the network traffic…and then hide exfiltration in plain sight…
Author
Released
12/11/2018- How tunneling works
- Running a local SSH tunnel
- Dynamic SSH tunneling
- Pivoting with Armitage and Metaspoit
- Exfiltrating using DET and DNS
- Covert exfiltration with Cachetalk
- Using PyExfil to exfiltrate over HTTPS
Skill Level Advanced
Duration
Views
Related Courses
-
Ethical Hacking: Penetration Testing
with Lisa Bock1h 29m Intermediate -
Penetration Testing Essential Training
with Malcolm Shore2h 29m Intermediate -
Penetration Testing: Advanced Kali Linux
with Malcolm Shore2h 22m Intermediate
-
Introduction
-
Disclaimer1m 16s
-
1. Preparing the Lab
-
2. Tunneling
-
Introduction to tunneling6m 21s
-
Secure Shell (SSH) tunneling1m 30s
-
Running a local SSH tunnel2m 27s
-
Dynamic SSH tunneling2m 26s
-
-
3. Pivoting
-
What is a pivot?1m 48s
-
Pivoting with Armitage4m 7s
-
Pivoting with Metasploit1m 45s
-
-
4. Exfiltration
-
Introduction to exfiltration3m 44s
-
Beaconing3m 46s
-
Installing PyExfil2m 34s
-
Exfiltrating using DET2m 19s
-
Enhancing the Cachetalk tool3m 26s
-
Exfiltrating using DNS3m 7s
-
Installing OpenPuff1m 50s
-
-
Conclusion
-
Next steps1m 38s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Introduction to exfiltration