Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2’s. Discover which services, ports and protcols can bypass your DLP solutions.
Exfiltration occurs when attackers have access to sensitive data and they need to transfer it out to their servers. ATTACKIFY has different modules designed to exfiltrate test data over a number of different channels and methods.
Some of these modules include:
No actual organization data is exfiltrated from endpoints, only test data generated by ATTACKIFY.
Dashboards provide users with a complete overview of how data is exfiltrated from the organization and over which protocols and from which environments. These modules would mostly be used to test Data Loss Prevention and networking monitoring solutions.