Data Collection and Exfiltration
In this chapter, you will learn how to
• Describe techniques for collecting data from Windows and Linux operating systems
• Uncover native techniques for conducting data exfiltration
• Learn about various tools and frameworks used to assist with data exfiltration
Data collection and exfiltration are two pentesting tactics that are necessary when operating on the target’s network. An attacker who has malicious intent could be politically or financially motivated to collect and exfiltrate a target organization’s sensitive data, such as bank statements or intellectual property (e.g., patents or source code). However, during a pentest, data collection and exfiltration could serve multiple purposes, ...