Exfiltration Over C2 Channel

Exfiltration Over C2 Channel (T1041)

Using the tunnel you already built.

1. Request Body / Response

Sending data as POST requests.

  • DLP Risk: Firewalls inspect POST bodies.
  • Evasion: Encrypt the data before embedding it in the HTTP Request. AES(Data) -> Base64 -> HTTP POST.

2. Cookies and Headers

Hiding data in HTTP Headers.

  • Cookie: SessionID=...[encrypted_data]...
  • User-Agent: Mozilla/5.0 ... [encrypted_data]
  • Limit: Headers have size limits (usually ~8KB). Good for small secrets (keys), bad for 1GB databases.

3. Timing (Jitter)

  • Do not send 1GB in one second.
  • Chunking: Send 10KB chunks every 30 seconds.