• XSS.stack #1 – первый литературный журнал от юзеров форума

Files transfer

you need somewhere to send the data to. Once infected you can chunk all data and start sending it to C2 which tipically has an ip/port.

alternatively you can not send the data but open some persistant service on the infected machine and then ask C2 to gather info but again, you need to contact first
 
"method"? There is no method. it's not like what we did 20 years ago
with pirated DVD copies. Roll up domain fronting, C2 on Amazon AWS, Google GCP,
Microsoft Azure, and exfiltrate your data there, or funnel the data via them to your
storage. All of them are cheap, less than 1$/TB bandwidth. Storage is expensive, so
get a dedicated server somewhere, Google is still working :)
 
"method"? There is no method. it's not like what we did 20 years ago
with pirated DVD copies. Roll up domain fronting, C2 on Amazon AWS, Google GCP,
Microsoft Azure, and exfiltrate your data there, or funnel the data via them to your
storage. All of them are cheap, less than 1$/TB bandwidth. Storage is expensive, so
get a dedicated server somewhere, Google is still working :)
Do I have to put my server IDs and passwords in my program to make my tunnel?
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх