SlideShare a Scribd company logo
Introducing DET
(Data Exfiltration Toolkit)
Paul Amar - BSides Ljubjana - 09/03/2016
Introducing (DET) the Data Exfiltration Toolkit
100
Introducing (DET) the Data Exfiltration Toolkit
General Approach
TCP
DNS
HTTP
ICMP
SMTP
General Approach
TCP
DNS
HTTP
ICMP
SMTP
General Approach
TCP
DNS
HTTP
ICMP
SMTP
General Approach
TCP
DNS
HTTP
ICMP
SMTP
General Approach
TCP
DNS
HTTP
ICMP
SMTP
General Approach
TCP
DNS
HTTP
ICMP
SMTP
HammerToss (July 2015)
What’s available today?
What’s available today?
And many more.. created
almost everyday.
Not kidding.
Current state
TCP
DNS
HTTP
ICMP
Twitter DMs
SMTP (eg. Gmail)
Introducing DET
Configuration file (JSON format)
File to exfiltrate
Folder to exfiltrate / multi-threaded
Plugin(s) to use
Plugin(s) to exclude
Server mode
Configuration file
List all your plugins and their configuration
Configuration file
Each plugin has its own configuration
(username, pwd, …)
Configuration file
Additional configuration (XOR Key, Sleeping time, …)
Let’s dig a bit (Client-side)
“Registration” phase 1/2
“Registration” phase 2/2
Sending the data 1/2
Sending the data 2/2
“End” phase 1/2
“End” phase 2/2
So in few words..
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
But wait! There’s moar.
Additional plugins (Tor Integration) 1/2
Source: http://foxglovesecurity.com/2015/11/02/hack-like-the-bad-guys-using-tor-for-
firewall-evasion-and-anonymous-remote-access/
Additional plugins (Tor Integration) 2/2
“Experimental” plugins
Introducing (DET) the Data Exfiltration Toolkit
What’s next
- Port DET *entirely* to PowerShell (With Plugin based) (“Empire”-like)
- More plugins!
- Data obfuscation layer using Markov Chains
- https://github.com/bwall/markovobfuscate
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
Installation
Get/install it:
- git clone https://github.com/sensepost/DET
- pip install -r requirements --user (instal dependencies for the local user)
Client side:
- python det.py -f /etc/passwd -c ./config.json (or PS scripts)
Server side:
- python det.py -L -c ./config.json
sys.exit(0)
Paul Amar (paul@sensepost.com) / @PaulWebSec

More Related Content

PPTX
malware analysis
PPTX
DoS or DDoS attack
PPTX
Malware analysis
PPTX
Denial of service attack
PPTX
Basic Malware Analysis
PPTX
Attack on computer
PPTX
Denial of service
PPT
Trojan Horse Presentation
malware analysis
DoS or DDoS attack
Malware analysis
Denial of service attack
Basic Malware Analysis
Attack on computer
Denial of service
Trojan Horse Presentation

What's hot (20)

PPT
I P S P O O F I N G
PPTX
Reverse engineering malware
PPTX
Introduction to computer virus
PDF
Anatomy of a cyber attack
PPT
Lecture 12 malicious software
PPTX
Introduction to Malware Detection and Reverse Engineering
PPTX
Attack detection and prevention in the cyber
PPTX
Ethical hacking introduction to ethical hacking
PPTX
PPTX
Phishing Incident Response Playbook
PPTX
Ethical hacking ppt
PPTX
Ethical hacking
PDF
Cyber security:Tools used in cyber crime
PPTX
Rmi architecture
PPTX
Ip spoofing ppt
PPTX
Computer Malware and its types
PPTX
Basics of Denial of Service Attacks
PPTX
Malware ppt final.pptx
PPTX
Ethical hacking - Footprinting.pptx
PPTX
Network forensics and investigating logs
I P S P O O F I N G
Reverse engineering malware
Introduction to computer virus
Anatomy of a cyber attack
Lecture 12 malicious software
Introduction to Malware Detection and Reverse Engineering
Attack detection and prevention in the cyber
Ethical hacking introduction to ethical hacking
Phishing Incident Response Playbook
Ethical hacking ppt
Ethical hacking
Cyber security:Tools used in cyber crime
Rmi architecture
Ip spoofing ppt
Computer Malware and its types
Basics of Denial of Service Attacks
Malware ppt final.pptx
Ethical hacking - Footprinting.pptx
Network forensics and investigating logs
Ad

Viewers also liked (20)

PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
PPTX
ZaCon 2015 - Zombie Mana Attacks
PDF
Ruler and Liniaal @ Troopers 17
PDF
Heartbleed Overview
PPTX
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
PPTX
Threat Hunting with Splunk
PDF
IOCs Are Dead—Long Live IOCs!
PPTX
Container Days Conference Plesk 2016 - How AWS, Docker and Microservices infl...
PDF
Pour les fans de scènes pornographiques totalement revivifiantes gratis
PPTX
Threats to machine clouds
PPT
Major global information security trends - a summary
PDF
SNMP : Simple Network Mediated (Cisco) Pwnage
PDF
Putting the tea back into cyber terrorism
PPTX
Offence oriented Defence
PPTX
Wardriving & Kismet Introduction
PDF
How to prevent cyber attack with big data & intelligence(sfis170222)
PDF
Full_Article_GadgetTrak_Forbes_Reduced
PPTX
SplunkLive! Customer Presentation – Virtustream
PPTX
Threat Hunting with Splunk
PPTX
Operational Security
Improvement in Rogue Access Points - SensePost Defcon 22
ZaCon 2015 - Zombie Mana Attacks
Ruler and Liniaal @ Troopers 17
Heartbleed Overview
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
Threat Hunting with Splunk
IOCs Are Dead—Long Live IOCs!
Container Days Conference Plesk 2016 - How AWS, Docker and Microservices infl...
Pour les fans de scènes pornographiques totalement revivifiantes gratis
Threats to machine clouds
Major global information security trends - a summary
SNMP : Simple Network Mediated (Cisco) Pwnage
Putting the tea back into cyber terrorism
Offence oriented Defence
Wardriving & Kismet Introduction
How to prevent cyber attack with big data & intelligence(sfis170222)
Full_Article_GadgetTrak_Forbes_Reduced
SplunkLive! Customer Presentation – Virtustream
Threat Hunting with Splunk
Operational Security
Ad

Similar to Introducing (DET) the Data Exfiltration Toolkit (19)

PDF
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
PDF
CTM360 adv-0317-01 dns messenger
PDF
CTM360 adv-0317-01 dns messenger
PPTX
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
PPTX
Security intelligence using big data presentation (engineering seminar)
PPTX
Big Data for Security
PDF
Goodbye Data, Hello Exfiltration
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
PPTX
Become a Threat Hunter by Hamza Beghal
PDF
DNS Data Exfiltration Detection
PDF
Red Team Methodology - A Naked Look
PPTX
Breaking the cyber kill chain!
PPTX
Career in Ethical Hacking
PPTX
Botnet and its Detection Techniques
PPTX
Honeypots.ppt1800363876
PDF
Is DNS a Part of Your Cyber Security Strategy?
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
An Evolving Era of Botnet Empires @ BSides Las Vegas
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messenger
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
Security intelligence using big data presentation (engineering seminar)
Big Data for Security
Goodbye Data, Hello Exfiltration
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
Become a Threat Hunter by Hamza Beghal
DNS Data Exfiltration Detection
Red Team Methodology - A Naked Look
Breaking the cyber kill chain!
Career in Ethical Hacking
Botnet and its Detection Techniques
Honeypots.ppt1800363876
Is DNS a Part of Your Cyber Security Strategy?
PHDays 2018 Threat Hunting Hands-On Lab
An Evolving Era of Botnet Empires @ BSides Las Vegas

More from SensePost (20)

PDF
objection - runtime mobile exploration
PPTX
Vulnerabilities in TN3270 based Application
PDF
Botconf 2013 - DNS-based Botnet C2 Server Detection
PPTX
Rat a-tat-tat
PDF
Hacking Z-Wave Home Automation Systems
PPTX
Inside .NET Smart Card Operating System
PPT
Its Ok To Get Hacked
PPT
Web Application Hacking
PPT
Attacks and Defences
PDF
Corporate Threat Modeling v2
PPTX
State of the information security nation
PPS
OK I'm here, so what's in it for me?
PPT
Security threats facing SA businessess
PPT
Security in e-commerce
PDF
Penetration testing and social engineering
PDF
Getting punched in the face
PDF
The jar of joy
PPTX
Web 2.0 security woes
PPT
The difference between a duck
PPT
When good code goes bad
objection - runtime mobile exploration
Vulnerabilities in TN3270 based Application
Botconf 2013 - DNS-based Botnet C2 Server Detection
Rat a-tat-tat
Hacking Z-Wave Home Automation Systems
Inside .NET Smart Card Operating System
Its Ok To Get Hacked
Web Application Hacking
Attacks and Defences
Corporate Threat Modeling v2
State of the information security nation
OK I'm here, so what's in it for me?
Security threats facing SA businessess
Security in e-commerce
Penetration testing and social engineering
Getting punched in the face
The jar of joy
Web 2.0 security woes
The difference between a duck
When good code goes bad

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Monthly Chronicles - July 2025
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology

Introducing (DET) the Data Exfiltration Toolkit