Questions tagged [exfiltration]
The exfiltration tag has no summary.
17 questions
2votes
1answer
146views
ListDLLs command (Listdlls.exe) Shady EULA
This dialog pops up upon running the command. The dialog is essentially saying: "By using this software, it is the user's sole responsibility for any sensitive information provided to Microsoft ...
0votes
1answer
215views
How do RSA smartcards prevent key exfiltration?
Extracting private keys directly from the card is nearly impossible. With some acid package destruction and electron microscope work, a skilled team, and enough time, money, and luck you can in theory ...
1vote
2answers
414views
Can you exfiltrate data over a serial connection from the client?
When you manage some device over serial the connection is in general bidirectional. But usually the host manages the client by sending commands over the serial connection. Is there some easy way for ...
9votes
6answers
5kviews
A new programming paradigm (e.g., Rust) to reduce or end all zero-day vulnerabilities/exploits? [closed]
In view of the Hafnium and Solarwind hacks, where multiple zero-day vulnerabilities were used to ultimately stage the hack and data exfiltration, would the use of memory safe programming languages ...
0votes
1answer
166views
How Were FireEye's Tools Exfiltrated?
What was the mechanism for exfiltrating FireEye's redhat tools in the recent SolarWinds hack? I understand it was via HTTP (small packets to many servers)? Are there any further details? Is this a ...
1vote
1answer
1kviews
XXE with OOB data exfiltration
SCENARIO: I successfully tried to send a request to the burp collaborator, then the application is vulnerable to SSRF through blind XXE. The payload I used is the following <?xml version="1.0&...
5votes
2answers
274views
How does releasing exfiltrated data increase the chances of an attacker getting caught?
I'm reading an article from the Institute for Applied Network Security (IANS) titled "Ransomware 2.0: What It Is and What To Do About It", and there's a piece I don't understand. The article ...
0votes
1answer
234views
Google approach to device security (BeyondCorp): managed devices and inference engine
I'm reading the BeyondCorp papers and trying to get a very high level idea of how it could be implemented by a small to medium organisation, rather than a behemoth like Google. What kind of software ...
2votes
1answer
3kviews
Content Security Policy: postMessage into foreign iframe
Assume we have a webpage with sensitive data. The page uses a marketing partner advertisingpartner.com which collects data via third-party cookies in a foreign iframe. We have applied a relatively ...
1vote
1answer
422views
How to prevent a virus from stealing data when I transfer files between offline and online computers?
Let's say I have one offline computer with some important data, and one online computer. Sometimes I need to move files from the offline computer to the online one. When I transfer those files, is ...
6votes
1answer
182views
What are the EFAIL "backchannels in email clients not related to HTML"?
The published examples for exploiting the EFAIL email encryption vulnerability all appear to use HTML to create a backchannel for exfiltrating decrypted data. However, the homepage of EFAIL, https://...
4votes
1answer
653views
Exfiltrate data by injecting functions in Excel 2007 file rendered with PHP
I need to extract data from inside an Excel fille using Excel 2007 functions. The concept is somewhat related to stored XSS type of data exfiltration only that I need to use Excel 2007 functions (...
3votes
1answer
1kviews
What is good metric for detecting data exfiltration on covert channel?
Considering the scenario when the attacker is able to exfiltrate sensitive data from compromised system to external network or Internet, but there are only limited ways to achieve this because the ...
1vote
1answer
326views
Can malicious communication be hidden reasonably well in encrypted network traffic?
Given that a lot of websites now use TLS/https to encrypt all network traffic: If a client machine is compromised and does need to establish a back channel to a C&C-Server for additional ...
3votes
1answer
3kviews
How to exfiltrate data over remote desktop
I sometimes come across systems that are segregated in a way I know to be flawed. The arrangement usually looks like this: There is a general IT environment, which follows best practice: patching, ...