Learn what kind of information is sent out during an attack and why attackers need to protect it in this video.
- [Instructor] In the Lockheed Martin Cyber Kill Chain model…of a cyberattack, data exfiltration is one…of the possible actions taken in the final stage…of the attack.…Exfiltration covers the automated actions taken…by malware to send data out…to the attacker's collection point,…and it covers manual techniques used…by an intruder to pull data back from an attack session.…One of the main ways to detect a cyberattack is…to identify the data being exfiltrated,…and so, concealment is an important characteristic…of any serious exfiltration technique.…
This is particularly important…where documents being exfiltrated are classified.…It may trigger alarms if classification…markings are detected on the network.…Detecting sensitive data isn't the only way…exfiltration alarms can be set off.…The protocols used may trigger alarms either on their own…or when correlated with the packet destinations,…and so, exfiltration may need to be camouflaged.…Attacks will often try to understand the network traffic…and then hide exfiltration in plain sight…
- How tunneling works
- Running a local SSH tunnel
- Dynamic SSH tunneling
- Pivoting with Armitage and Metaspoit
- Exfiltrating using DET and DNS
- Covert exfiltration with Cachetalk
- Using PyExfil to exfiltrate over HTTPS
Skill Level Advanced
Ethical Hacking: Penetration Testingwith Lisa Bock1h 29m Intermediate
Penetration Testing Essential Trainingwith Malcolm Shore2h 29m Intermediate
Penetration Testing: Advanced Kali Linuxwith Malcolm Shore2h 22m Intermediate
1. Preparing the Lab
Next steps1m 38s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.