Red Team Operations
Red Team Operations
TEAM
OPERATIONS - MITRE ATTACK
INTRO
PREREQUISITES
The candidate should have a basic understanding of web and
Networking and also know the fundamental approach of system
hacking.
Data Transfer Size Limits: An adversary may exfiltrate data in fixed size
chunks instead of whole files or limit packet sizes below certain
thresholds. This approach may be used to avoid triggering network
data transfer threshold alerts.
Exfiltration Over Unencrypted Non-C2 Protocol: Adversaries may steal
data by exfiltrating it over an un-encrypted network protocol other than
that of the existing command and control channel. The data may also
be sent to an alternate network location from the main command and
control server.
Data Exfiltration with Steganography: Cloakify Factory transforms any
filetype (e.g .zip, .exe, .xls,etc.) into a list of harmless-looking string. This
hides the file in plain sight and transfer it without triggering alerts. It
even defeats signature-based malware detection tools.
Exfiltration Over Alternative Protocol: Adversaries may steal data by
exfiltrating it over a different protocol than that of the existing
command and control channel. The data may also be sent to an
alternate network location from the main command and control server.
Contact us
PHONE
+91-9599387841 | +91 11 4510 3130
WHATSAPP
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
[email protected]
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/
hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/Ignitetechnologies