Overview
Exfiltration is the process of transferring data from a compromised host to an attacker-controlled location. This page covers common transfer techniques across multiple protocols and operating systems.Base64 Copy-Paste
LinuxHTTP
Download on Victim
LinuxUpload Server (Attacker Side)
HTTPS Server
Collaboration Platform Webhooks
Webhooks (Discord/Slack/Teams) are HTTPS endpoints that accept JSON — commonly allowed to trusted SaaS domains, making them ideal for C2 beaconing and exfiltration.SMB
Attacker (Kali) as SMB ServerFTP
FTP Server (Python)TFTP
SCP / SSHFS
Netcat
ICMP Exfiltration
DNS Exfiltration
Protocol Summary
| Protocol | Use Case | Detection Risk |
|---|---|---|
| HTTP/S | File download/upload, C2 | Low (blends with web traffic) |
| SMB | File share, Windows environments | Medium |
| FTP | Simple file transfer | Medium-High |
| DNS | Covert channel, exfil through strict firewalls | Low |
| ICMP | Bypass firewalls blocking TCP/UDP | Low-Medium |
| Webhook | C2 over trusted SaaS domains | Very Low |
| SCP/SSHFS | Direct file transfer with SSH | Low |