Ayo Secu

  • 홈
  • 태그
  • 방명록

exfiltration 1

Exfiltration

ExfiltrationIn the exfiltration phase, attackers move the data they’ve collected out of the compromised environment to their own infrastructure, allowing them to access and leverage the information externally. Exfiltration techniques vary depending on the attacker’s goals, network controls, and the data’s sensitivity. Common methods include using removable media, command-and-control (C2) channel..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

identity, mitigations, web application, Detection, infrastructure virtualization, Authentication, os implementation, NETWORK SECURITY, Digital Forensics, systems, Exploit, security terms, threat modeling, Cryptography, incident management, cybersecurity, network, forensic, security, attack structure,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바