RDP Exfil - The technique that works almost every time
Exfiltration of data is often, arguably the most important stage in any Red Team engagement. But did you ever realize that one of the most known and exploited infil technique can be abused?

🌬️ Using RDP for exfiltration of data
🚨Traditional copy and paste

🚨Drive mapping


🥳 Monitoring/Detection Opportunities

🛣️ Final Thoughts
PreviousAdversarial Tradecraft Research & DetectionNextSmishing Traid targets India with large scale "India Post" themed iMessage phish texts
Last updated