Skip to main content

Questions tagged [exfiltration]

2votes
1answer
146views

ListDLLs command (Listdlls.exe) Shady EULA

This dialog pops up upon running the command. The dialog is essentially saying: "By using this software, it is the user's sole responsibility for any sensitive information provided to Microsoft ...
Marinn's user avatar
0votes
1answer
215views

How do RSA smartcards prevent key exfiltration?

Extracting private keys directly from the card is nearly impossible. With some acid package destruction and electron microscope work, a skilled team, and enough time, money, and luck you can in theory ...
JamesTheAwesomeDude's user avatar
1vote
2answers
414views

Can you exfiltrate data over a serial connection from the client?

When you manage some device over serial the connection is in general bidirectional. But usually the host manages the client by sending commands over the serial connection. Is there some easy way for ...
hadnolunchyet's user avatar
9votes
6answers
5kviews

A new programming paradigm (e.g., Rust) to reduce or end all zero-day vulnerabilities/exploits? [closed]

In view of the Hafnium and Solarwind hacks, where multiple zero-day vulnerabilities were used to ultimately stage the hack and data exfiltration, would the use of memory safe programming languages ...
Nathan Aw's user avatar
0votes
1answer
166views

How Were FireEye's Tools Exfiltrated?

What was the mechanism for exfiltrating FireEye's redhat tools in the recent SolarWinds hack? I understand it was via HTTP (small packets to many servers)? Are there any further details? Is this a ...
Ryan's user avatar
  • 173
1vote
1answer
1kviews

XXE with OOB data exfiltration

SCENARIO: I successfully tried to send a request to the burp collaborator, then the application is vulnerable to SSRF through blind XXE. The payload I used is the following <?xml version="1.0&...
Maicake's user avatar
5votes
2answers
274views

How does releasing exfiltrated data increase the chances of an attacker getting caught?

I'm reading an article from the Institute for Applied Network Security (IANS) titled "Ransomware 2.0: What It Is and What To Do About It", and there's a piece I don't understand. The article ...
pancake-house's user avatar
0votes
1answer
234views

Google approach to device security (BeyondCorp): managed devices and inference engine

I'm reading the BeyondCorp papers and trying to get a very high level idea of how it could be implemented by a small to medium organisation, rather than a behemoth like Google. What kind of software ...
Augusto's user avatar
2votes
1answer
3kviews

Content Security Policy: postMessage into foreign iframe

Assume we have a webpage with sensitive data. The page uses a marketing partner advertisingpartner.com which collects data via third-party cookies in a foreign iframe. We have applied a relatively ...
matoro's user avatar
1vote
1answer
422views

How to prevent a virus from stealing data when I transfer files between offline and online computers?

Let's say I have one offline computer with some important data, and one online computer. Sometimes I need to move files from the offline computer to the online one. When I transfer those files, is ...
GuessMe's user avatar
6votes
1answer
182views

What are the EFAIL "backchannels in email clients not related to HTML"?

The published examples for exploiting the EFAIL email encryption vulnerability all appear to use HTML to create a backchannel for exfiltrating decrypted data. However, the homepage of EFAIL, https://...
sleske's user avatar
  • 2,009
4votes
1answer
653views

Exfiltrate data by injecting functions in Excel 2007 file rendered with PHP

I need to extract data from inside an Excel fille using Excel 2007 functions. The concept is somewhat related to stored XSS type of data exfiltration only that I need to use Excel 2007 functions (...
Lucian Nitescu's user avatar
3votes
1answer
1kviews

What is good metric for detecting data exfiltration on covert channel?

Considering the scenario when the attacker is able to exfiltrate sensitive data from compromised system to external network or Internet, but there are only limited ways to achieve this because the ...
Pandora's user avatar
1vote
1answer
326views

Can malicious communication be hidden reasonably well in encrypted network traffic?

Given that a lot of websites now use TLS/https to encrypt all network traffic: If a client machine is compromised and does need to establish a back channel to a C&C-Server for additional ...
Tobi Nary's user avatar
3votes
1answer
3kviews

How to exfiltrate data over remote desktop

I sometimes come across systems that are segregated in a way I know to be flawed. The arrangement usually looks like this: There is a general IT environment, which follows best practice: patching, ...
paj28's user avatar
  • 34.8k

153050per page
close