Hacker News new | past | comments | ask | show | jobs | submit | bitquark's comments login

The point of the post was to show how easy it is, as people seem to miss these commands or may not be aware of how easy it is to set up a listening service. It's exfiltration by definition, but you are of course free to mangle the data any way you want or use DNS techniques if you really care about hiding what you're doing, but that's a different post.


What is your definition of exfiltration? Or more importantly how do you distinguish between exfil and normal transfer by an authorized user?


Agreed, I've clarified why I went with ftp and added a note with example usage of nc, thanks!


Indeed! I meant to mention the nc option, but I've found that ftpput/get are more often available than nc, perhaps something to do with the ubiquity of ftp.


Much the other way around. Netcat is ubiquitous. I haven't come across many systems with ftpput and ftpget.

Neat challenge left as an exercise to the reader: whois can be used to transfer files too. :)


Interesting, we must be looking at a different class of devices. If we're going down that road, there's always base64 and copy + paste!


>whois can be used to transfer files too.

Ah, the old DNS-tunnelling trick. A fun way to flip cheap hotels the bird.


Of course! I did know for certain there was no monetary benefit. A t-shirt would have been nice, but I investigated for the fun of it.


Nice to meet you! There's always one that slips through the net ;-)


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: