Data Exfiltration Techniques | DNS Exfiltration | TryHackMe

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • In this video walk-through, we covered Data Exfiltration through DNS protocol and performed C2 through DNS as well.
    **********
    Receive Cyber Security Field Notes and Special Training Videos
    / @motasemhamdan
    *******
    Writeup
    motasem-notes....
    TryHackMe Data Exfiltration
    tryhackme.com/...
    *****
    Google Profile
    maps.app.goo.g...
    LinkedIn
    [1]: / motasem-hamdan-7673289b
    [2]: / motasem-eldad-ha-bb424...
    Instagram
    / motasem.hamdan.official
    Twitter
    / manmotasem
    Facebook
    / motasemhamdantty

Комментарии • 7

  • @viralhysteria
    @viralhysteria 2 года назад +1

    really appreciate you uploading these, i was having an abnormally difficult experience navigating this module on some parts compared to the last 100+ I've done.

  • @codermomo1792
    @codermomo1792 5 месяцев назад

    thanks, good explanation

  • @techgeek6773
    @techgeek6773 11 месяцев назад

    thank u so much for clear explanation.

  • @radomirbabek4811
    @radomirbabek4811 Год назад

    Base64 is not URL safe, but it can be converted easily by replacing some characters. I got punished for using it at my uni and probably won't make it through the networking course. Anyway, thanks for the tutorial.

  • @kwrahawrami21
    @kwrahawrami21 2 года назад

    i need an soft soft crack how can i get it

  • @akshaychauhan4260
    @akshaychauhan4260 2 года назад

    i am getting some issue on task 8, can you let me know IP address please