Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Data Exfiltration

Premium room

An introduction to Data Exfiltration and Tunneling techniques over various protocols.

hard

60 min

19,182

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Welcome to Data Exfiltration

Cybercriminals use various internet attacks against companies for different purposes. In most cases, many of these attacks end in data breaches, where threat actors steal sensitive data to sell it on the dark web or publish it online.

Someone may ask: how does a threat actor transfer stolen data from a company's network to the outside, also known as a data breach, without being detected? The answer varies. There are many techniques that a threat actor can perform, including data exfiltration. 

Data exfiltration is a non-traditional approach for copying and transferring data from a compromised to an attacker's machine. The data exfiltration technique is used to emulate the normal network activities, and It relies on network protocols such as , , , etc. Data Exfiltration over common protocols is challenging to detect and distinguish between legitimate and malicious traffic.

Some protocols are not designed to carry data over them. However, threat actors find ways to abuse these protocols to bypass network-based security products such as a Using these techniques as a red teamer is essential to avoid being detected.

Learning Objectives

This room introduces the data exfiltration types and showcases the techniques used to transfer data over various protocols.

  • What is Data exfiltration?
  • Understand data exfiltration types and how they can be used.
  • Practice data exfiltration over protocols: Sockets, , ICMP, (s), and .
  • Practice communications over various protocols.
  • Practice establishing Tunneling over and .

Room Prerequisites

Answer the questions below
Read the task above!

Ready to learn Cyber Security?

The Data Exfiltration room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.