Skip to Content
Hands-On Red Team Tactics
book

Hands-On Red Team Tactics

by Himanshu Sharma, Harpreet Singh
September 2018
Intermediate to advanced
480 pages
9h 45m
English
Packt Publishing
Content preview from Hands-On Red Team Tactics

Chapter 13: Data Exfiltration

  1. Yes, there are alternative methods such as FTP, SSH, Gmail, Twitter, and so on. A lot of tools and PoC codes can be found on the internet for exfiltration of data. And, it's not totally undetectable, these techniques help you avoid detection to a certain level, but we should consider the fact that Blue team may also know about these tools and might be monitoring tool-specific channels for any activity.
  2. Frequency analysis is one of the known ciphertext attacks. This is based on the study of the frequency of letters or groups of letters in a ciphertext. Frequency analysis is used for breaking substitution ciphers. The general idea is to find the popular letters in the ciphertext and to try to replace them with ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storytelling with You

Storytelling with You

Cole Nussbaumer Knaflic
The Manager's Path

The Manager's Path

Camille Fournier
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781788995238Other