Exfiltration
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Commonly whitelisted domains to exfiltrate information
Check https://lots-project.com/ to find commonly whitelisted domains that can be abused
Copy&Paste Base64
Linux
base64 -w0 <file> #Encode file
base64 -d file #Decode fileWindows
certutil -encode payload.dll payload.b64
certutil -decode payload.b64 payload.dllHTTP
Linux
Windows
Upload files
Python module uploadserver:
HTTPS Server
FTP
FTP server (python)
FTP server (NodeJS)
FTP server (pure-ftp)
Windows client
SMB
Kali as server
Or create a smb share using samba:
Windows
SCP
The attacker has to have SSHd running.
SSHFS
If the victim has SSH, the attacker can mount a directory from the victim to the attacker.
NC
/dev/tcp
Download file from victim
Upload file to victim
thanks to @BinaryShadow_
ICMP
SMTP
If you can send data to an SMTP server, you can create an SMTP to receive the data with python:
TFTP
By default in XP and 2003 (in others it needs to be explicitly added during installation)
In Kali, start TFTP server:
TFTP server in python:
In victim, connect to the Kali server:
PHP
Download a file with a PHP oneliner:
VBScript
Victim
Debug.exe
The debug.exe program not only allows inspection of binaries but also has the capability to rebuild them from hex. This means that by providing an hex of a binary, debug.exe can generate the binary file. However, it's important to note that debug.exe has a limitation of assembling files up to 64 kb in size.
Then copy-paste the text into the windows-shell and a file called nc.exe will be created.
DNS
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Last updated