Category:Exfiltration: Difference between revisions

Category page
m (Protected "Category:Exfiltration" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
No edit summary
 
Line 1: Line 1:
Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.
=Description=
Exfiltration refers to the techniques used by cyber adversaries to steal data from a target network. After collecting data, the adversary often packages it to conceal its detection while removing it, which may involve compression and encryption. The data is typically transferred out of the network via the adversary's command and control channel or an alternate channel, with size limitations placed on the transmission to avoid detection.

Latest revision as of 14:59, 29 January 2023

Description

Exfiltration refers to the techniques used by cyber adversaries to steal data from a target network. After collecting data, the adversary often packages it to conceal its detection while removing it, which may involve compression and encryption. The data is typically transferred out of the network via the adversary's command and control channel or an alternate channel, with size limitations placed on the transmission to avoid detection.

Subcategories

This category has the following 5 subcategories, out of 5 total.

Pages in category "Exfiltration"

The following 4 pages are in this category, out of 4 total.