The unauthorized transfer of data from a compromised system to an attacker-controlled location. Exfiltration can occur via network channels, physical media, or covert channels.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free