Skip to Content
Hands-On Red Team Tactics
book

Hands-On Red Team Tactics

by Himanshu Sharma, Harpreet Singh
September 2018
Intermediate to advanced
480 pages
9h 45m
English
Packt Publishing
Content preview from Hands-On Red Team Tactics

Summary

In this chapter, we learned about data exfiltration and why it is needed. Then, we learned some basic ways of transferring data using simple tools like Netcat, OpenSSL, and PowerShell. Next, we jumped into transforming the data using text-based steganography to avoid detection, as well as looking at the usage of the CloakifyFactory tool. We also learned about extracting data via DNS from a victim machine to our server. Lastly, we explored how to exfiltrate data using Dropbox API to avoid detection, suspicion, and for bypassing firewalls.

Our journey with you ends here. We hope that you have enjoyed reading these chapters and that you have learned from them as well.

We would love to hear your feedback on this book. You can reach us ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storytelling with You

Storytelling with You

Cole Nussbaumer Knaflic
The Manager's Path

The Manager's Path

Camille Fournier
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781788995238Other