Главная
Study mode:
on
1
Intro
2
DNS File Exfiltration?
3
Avoiding Detection
4
DFEX Algorithm
5
Diagram: Control Flow
6
Diagram: Data Flow
7
Packet Example
8
Demo Infra (MACCHERONI)
9
Performance
10
Limitations
11
Conclusion
Description:
Explore data exfiltration techniques using DNS in this 53-minute conference talk from the Hack In The Box Security Conference. Delve into the development of a unique protocol for transferring files across networks, addressing limitations of existing tools and bypassing next-generation firewalls. Learn about innovative "Hidden In Plain Sight" tactics for pushing files out of secure environments. Presented by Emilio Couto, an experienced security consultant, the talk covers DNS file exfiltration concepts, detection avoidance strategies, the DFEX algorithm, control and data flow diagrams, packet examples, and a demonstration of the MACCHERONI infrastructure. Examine performance metrics, discuss limitations, and gain insights into cutting-edge post-exploitation techniques in network security.

DFEx - DNS File Exfiltration

Hack In The Box Security Conference
Add to list
0:00 / 0:00