How hackers exfiltrate data via DNS

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ม.ค. 2025

ความคิดเห็น • 12

  • @lucascardoso7844
    @lucascardoso7844 13 วันที่ผ่านมา

    Amazing bro, Brazilian greetings!

  • @qoranemahamud
    @qoranemahamud 11 หลายเดือนก่อน +1

    keep going my brother

  • @chathurangaonnet
    @chathurangaonnet 11 หลายเดือนก่อน +2

    Great Video. Thanks for sharing this knowledge

  • @Pawlo370
    @Pawlo370 6 หลายเดือนก่อน

    wait Amazon is Polish and I don't know this!?

  • @tpevers1048
    @tpevers1048 10 หลายเดือนก่อน

    I don't understand the purpouse of this attack if you alteady hacked the user computer just cat the file and then you get the files why all this pain and thank you for responding❤

    • @screeck
      @screeck  10 หลายเดือนก่อน

      The main purpose is to be as silent as possible. From what I understand certain actions might be monitored on target system including using "cat" for some files. So even if your presence in the target network got detected, you leave (almost)no traces of any data being stolen.

    • @tpevers1048
      @tpevers1048 10 หลายเดือนก่อน

      But do you think how much IS this so difficult to install the program on the infected system and then figure a way to not see you openning that Window popup on his monitor why instead of all that just cat the file and then erase all logs or replace them with logs without any actions from your part .unless if you do not have hvnc that let you open Windows on the computer you cannot run the exe that transmit the files to your sys and also the packets Can bé captured bye someone else on the network so i think this IS not good practice.and final ly i wanna add that you make great content Hope you doeing well and continue what you are doeing and espeacially what i liked the most its that you take the Time to explain really complexe with simple examples ❤️❤️ i'd really enjoy if you creat a group for everybody whois trying to understandand in depth concept

    • @tpevers1048
      @tpevers1048 10 หลายเดือนก่อน

      If you want WE Can creat a group to do ctf im a starter and id like someone to help me understand complexe topics

    • @screeck
      @screeck  10 หลายเดือนก่อน

      ​@@tpevers1048 good point, this is definitly a case sensitive mathod, it would work sometimes, sometimes not. I'm glad you like my work, I was thinking about creating a discord server for my comunity (small but growing hah), but for now you can add me on discord and I'll keep you updated: @screeck

    • @tpevers1048
      @tpevers1048 10 หลายเดือนก่อน

      Ok

  • @Loveuhittler
    @Loveuhittler 11 หลายเดือนก่อน +2

    Just waiting for really dark stuff😈

  • @RoyalGxng
    @RoyalGxng 10 หลายเดือนก่อน

    This attack is only viable in the case were arp poisoning is possible AKA being in the same network as the target machine. For THM machines or anything outside your own network, the hustle you would go through to replicate this process without arp poisoning is not worth it