ATTACKIFY





Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2’s. Discover which services, ports and protcols can bypass your DLP solutions.

Exfiltration Modules

Exfiltration occurs when attackers have access to sensitive data and they need to transfer it out to their servers. ATTACKIFY has different modules designed to exfiltrate test data over a number of different channels and methods.

Some of these modules include:

  • DNS Exfiltration
  • Data over ICMP, SMTP, HTTPS, FINGER
  • HIPAA Data
  • PCI Data
  • Custom Data Encodings
  • DNS over HTTPS

No actual organization data is exfiltrated from endpoints, only test data generated by ATTACKIFY.

Dashboards provide users with a complete overview of how data is exfiltrated from the organization and over which protocols and from which environments. These modules would mostly be used to test Data Loss Prevention and networking monitoring solutions.

Related Modules

APT

These modules are based off individual APT tactics, techniques and procedures to assist security teams in identifying suspicious activity usually seen in advanced persistent attackers.

more info

Ransomware

Select from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.

more info

Ransomware

Select from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.

more info