├── Exotic data exfiltration_jeanmichel.amblat-DEFCON30-final.pptx ├── README.md └── video.mp4 /Exotic data exfiltration_jeanmichel.amblat-DEFCON30-final.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/sourcefrenchy/DEFCON-30---Exotic-Data-Exfiltration/85f5ae3a8d3c27aa03035ab98feb2d6a5434ea11/Exotic data exfiltration_jeanmichel.amblat-DEFCON30-final.pptx -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # DEFCON-30---Exotic-Data-Exfiltration 2 | Slides from my talk at the Adversary Village, Defcon 30 3 | 4 | # Lightning talk: Exotic data exfiltration 5 | 6 | In this talk we will explore 3 different ideas that could be used for data exfiltration after successful compromise. These techniques, while simple, are quite different from the traditional DNS, SMB, HTTP(S), SMTP abuse cases that have been covered deeply and described in the MITRE ATT&CK framework. Source code for each proof of concept code will be made available after the talk. 7 | -------------------------------------------------------------------------------- /video.mp4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/sourcefrenchy/DEFCON-30---Exotic-Data-Exfiltration/85f5ae3a8d3c27aa03035ab98feb2d6a5434ea11/video.mp4 --------------------------------------------------------------------------------