How to do it...

Let's perform the following steps:

  1. Assuming we already have an agent connected to our Empire, we will interact with our agent and run the following command:
usemodule exfiltration/exfil_dropbox

  1. To view the details of the module, use the info command, as shown in the following screenshot:

  1. We set the path of the file we wish to transfer and the Dropbox API key, along with the target filename:

  1. Once everything has been set up, we can execute the module, as shown in the following screenshot. The agent will then transfer the file to Dropbox using the Dropbox API. All of this is done inside the memory itself, thereby making it harder to detect:

  1. By viewing our Dropbox account, we can see that a folder has been created. Inside this folder, we should have our password file, which we want to transfer:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.119.251