CHAPTER 8

Data Collection and Exfiltration

In this chapter, you will learn how to

•  Describe techniques for collecting data from Windows and Linux operating systems

•  Uncover native techniques for conducting data exfiltration

•  Learn about various tools and frameworks used to assist with data exfiltration

 

 

Data collection and exfiltration are two pentesting tactics that are necessary when operating on the target’s network. An attacker who has malicious intent could be politically or financially motivated to collect and exfiltrate a target organization’s sensitive data, such as bank statements or intellectual property (e.g., patents or source code). However, during a pentest, data collection and exfiltration could serve multiple purposes, ...

Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.