Exfiltration

Commonly whitelisted domains to exfiltrate information

Check https://lots-project.com/ to find commonly whitelisted domains that can be abused

Copy&Paste Base64

Linux

base64 -w0 <file> #Encode file
base64 -d file #Decode file

Windows

certutil -encode payload.dll payload.b64
certutil -decode payload.b64 payload.dll

HTTP

Linux

Windows

Upload files

HTTPS Server

FTP

FTP server (python)

FTP server (NodeJS)

FTP server (pure-ftp)

Windows client

SMB

Kali as server

Or create a smb share using samba:

Windows

SCP

The attacker has to have SSHd running.

SSHFS

If the victim has SSH, the attacker can mount a directory from the victim to the attacker.

NC

/dev/tcp

Download file from victim

Upload file to victim

thanks to @BinaryShadow_

ICMP

SMTP

If you can send data to an SMTP server, you can create an SMTP to receive the data with python:

TFTP

By default in XP and 2003 (in others it needs to be explicitly added during installation)

In Kali, start TFTP server:

TFTP server in python:

In victim, connect to the Kali server:

PHP

Download a file with a PHP oneliner:

VBScript

Victim

Debug.exe

The debug.exe program not only allows inspection of binaries but also has the capability to rebuild them from hex. This means that by providing an hex of a binary, debug.exe can generate the binary file. However, it's important to note that debug.exe has a limitation of assembling files up to 64 kb in size.

Then copy-paste the text into the windows-shell and a file called nc.exe will be created.

DNS

Last updated