exfiltration   105

« earlier    

Exfiltration Methods - Google Sheets
Favorite tweet:

I can think of 99 ways to exfil data. Give me an exfil method I am not thinking about and making searches for:https://t.co/GhzNASHoxX

— { {C:\raig} {Chamberlain} } (@randomuserid) April 2, 2019
april 2019 by whip_lash
kscope/HDD-microphones.pdf at master · ortegaalfredo/kscope
Required custom HDD firmware, but they got to 30KHz sampling rate for audio recovery (so close to CD quality)
HDD  audio  sound  recovery  microphone  data  exfiltration  research 
march 2019 by asteroza
using custom TCP/IP stacks to assist bypassing UTM firewalls
custom  TCP  IP  stack  software  evasion  exfiltration  security  hacking  pentesting 
october 2018 by asteroza
[no title]
defines criteria for "perfect exfiltration" kerckhoff principle-based, etc
project  sandie  exfiltration 
july 2018 by marcina
"Covert channels in the HTTP network protocol: Channel characterization" by Daryl Johnson, Bo Yuan et al.
defines a set of common characteristics, classify and analyze several known covert channels in HTTP
project  sandie  exfiltration  covertchannel 
july 2018 by marcina
Covert Channels and Countermeasures in Computer Network Protocols
overview of the existing techniques for creating
covert channels in widely deployed network protocols,
and common methods for their detection
project  sandie  exfiltration  countermeasures 
july 2018 by marcina

« earlier    

related tags

air-gaps  air  airgap  alert  alternative  am  analytics  anchor  antivirus  asset  attack  attacks  audio  aws  bestof  binary  blog  boobytrap  browser  bug  busybox  c&c  c2  canary  canarytoken  chain  channel  channels  chat  checking  cia  cipher  clicktale  command  commix  communication  consumer  control  cool  counter_intelligence  countermeasures  courts  covert  covertchannel  credential  cryptography  csp  css  csv  custom  cybersecurity  data  database  defeat  defense  delicious  delivery  deserialization  detection  dfir  diy  dlp  dma  dns  dnstoken  egress  emails  encapsulation  encryption  endpoint  espionnage  ethics  evasion  event  exploit  extraction  facebook  file  framework  ftp  fullstory  gapped  generator  github  gsm  gsmem  hacking  hak5  hardware  hdd  honeytoken  hotjar  hping3  http/2  http  http2  icmp  infiltration  information  infosec  input  intelligence  ip  java  javascript  jump  kali  keyboard  knocking  law  led  line  linux  logging  lolbin  lookup  malware  memory  message  messenger  metasploit  microphone  mobile-phones  monitoring  named  netcat  network  networking  nytimes  obfuscation  oob  opensource  opera  optical  os_x  out-of-band  packet  panopticon  papers  payload  pci  pcie  pciexpress  pcr  penetration  pentest  pentesting  persistence  pipe  pivoting  poc  pocket  port  postexploitation  power  powershell  prefetch  privacy  producer  project  proof-of-concept  protocol  proxy  putin  python  qrcode  radio  ratio  rdp  recon  recording  recovery  red-team  redteam  reference  request  research  reverse  reverseshell  rf  rtl-sdr  russia  sandie  security  serialization  server  service  session-replay  session  sessioncam  shell  side  sidechannel  smartlook  smb  smuggling  software  sound  sql  stack  statistics  steganography  stream  streaming  surveillance  sysadmin  tarpit  tcp  telegram  tempest  testing  text  timing  tips  tls  token  tool  tools  tracking  traffic  transfer  tricks  trump_administration  tunnel  tunneling  twitter  type:tool  udp  urltoken  usability  usb  usbee  user  username  userreplay  utilities  video  virtual  virus  vpn  wapo  web  webbug  webdev  websites  whois  wiki  windows  wmi  worm  xss  yandex 

Copy this bookmark: