{"id":1386,"date":"2026-01-07T03:09:28","date_gmt":"2026-01-07T03:09:28","guid":{"rendered":"https:\/\/zombierollz.blog\/?p=1386"},"modified":"2026-01-07T03:09:28","modified_gmt":"2026-01-07T03:09:28","slug":"data-exfiltration-detection","status":"publish","type":"post","link":"https:\/\/zombierollz.blog\/?p=1386","title":{"rendered":"Data Exfiltration Detection"},"content":{"rendered":"\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-6a2a9d225cdb92d5873630342e55ee66\">https:\/\/tryhackme.com\/room\/dataexfildetection<br>Created by: tryhackme, Dex01<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"539\" height=\"208\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-204814.png\" alt=\"\" class=\"wp-image-1387\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-204814.png 539w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-204814-300x116.png 300w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-7f54e5c43de4e4b0a89e5cb6d297eb72\">There are two software we will be using in this lab: Wireshark and Splunk. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"731\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-205419.png\" alt=\"\" class=\"wp-image-1389\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-205419.png 940w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-205419-300x233.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-04-205419-768x597.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-d6a985ce3654a8c801c630e4aef7de74\">In Task 3, THM goes over Data exfiltration and various threat actors and their data exfiltration methods. Pet THM, &#8220;Data exfiltration is the unauthorized transfer of data from an organization to an external destination controlled by an adversary. It can be deliberate (insider) or via malware \/ compromised credentials.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"895\" height=\"782\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061206.png\" alt=\"\" class=\"wp-image-1390\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061206.png 895w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061206-300x262.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061206-768x671.png 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"861\" height=\"774\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061630.png\" alt=\"\" class=\"wp-image-1391\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061630.png 861w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061630-300x270.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061630-768x690.png 768w\" sizes=\"auto, (max-width: 861px) 100vw, 861px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"895\" height=\"160\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736.png\" alt=\"\" class=\"wp-image-1392\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736.png 895w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736-300x54.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736-768x137.png 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"895\" height=\"160\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736-1.png\" alt=\"\" class=\"wp-image-1393\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736-1.png 895w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736-1-300x54.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-061736-1-768x137.png 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"447\" height=\"499\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-072927.png\" alt=\"\" class=\"wp-image-1394\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-072927.png 447w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-072927-269x300.png 269w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-f3a50dca365179587ae28ce2a02402ee\">Going into task 4, THM has us go into Wireshark to investigate the dns pcap file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"716\" height=\"220\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064404.png\" alt=\"\" class=\"wp-image-1395\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064404.png 716w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064404-300x92.png 300w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-9216cf28f2962a566a36f59947a6032a\">&#8220;What is the suspicious domain receiving the DNS traffic?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"220\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064854-1024x220.png\" alt=\"\" class=\"wp-image-1396\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064854-1024x220.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064854-300x65.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064854-768x165.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-064854.png 1251w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-eac238a46b6a32b75156e6bb87833608\">&#8220;How many suspicious traffic\/logs related to dns tunneling were observed?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"171\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-065319-1024x171.png\" alt=\"\" class=\"wp-image-1397\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-065319-1024x171.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-065319-300x50.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-065319-768x129.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-065319.png 1177w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-b43964f52f27f9cb78d1d6e20959dd8a\">&#8220;Which local IP sent the maximum number of suspicious requests?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"353\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-070032-1024x353.png\" alt=\"\" class=\"wp-image-1399\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-070032-1024x353.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-070032-300x103.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-070032-768x265.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-070032.png 1381w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a43605830757b15fb9640d28889d63a0\">In the next task, we focus on ftp traffic and go back to Wireshark to analyze it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"461\" height=\"289\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082257.png\" alt=\"\" class=\"wp-image-1400\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082257.png 461w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082257-300x188.png 300w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"541\" height=\"175\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-072307.png\" alt=\"\" class=\"wp-image-1401\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-072307.png 541w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-072307-300x97.png 300w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-8f81e0503dad6ad0774f8eda55baa628\">&#8220;How many connections were observed from the guest account?&#8221; 5<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"153\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082301.png\" alt=\"\" class=\"wp-image-1402\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082301.png 886w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082301-300x52.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082301-768x133.png 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-069437ffccbaf6947c78149e46ed6976\">&#8220;Apply the filter; what is the name of the customer-related file exfiltrated from the root account?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"402\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082504-1024x402.png\" alt=\"\" class=\"wp-image-1404\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082504-1024x402.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082504-300x118.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082504-768x302.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-082504.png 1385w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-b3131bf0b6cd8ef28563e3db03cac757\">&#8220;Which internal IP was found to be sending the largest payload to an external IP?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1014\" height=\"247\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090226.png\" alt=\"\" class=\"wp-image-1405\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090226.png 1014w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090226-300x73.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090226-768x187.png 768w\" sizes=\"auto, (max-width: 1014px) 100vw, 1014px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-80b0ad51cc0391016c8128ef124f7d2a\">&#8220;What is the flag hidden inside the ftp stream transferring the CSV file to the suspicious IP?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090327-1024x417.png\" alt=\"\" class=\"wp-image-1406\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090327-1024x417.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090327-300x122.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090327-768x313.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090327.png 1375w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-badbf58e59c0c21b717dfdc325e7041e\">Task 6 focuses on HTTP!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"317\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090543.png\" alt=\"\" class=\"wp-image-1407\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090543.png 428w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-090543-300x222.png 300w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-caf39d97b7738d1d0eae9bc79547f09f\">&#8220;Which internal compromised host was used to exfiltrate this sensitive data?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"259\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091301-1024x259.png\" alt=\"\" class=\"wp-image-1408\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091301-1024x259.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091301-300x76.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091301-768x195.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091301.png 1378w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ecba22869419509a3c53c723fbb7e286\">&#8220;What&#8217;s the flag hidden inside the exfiltrated data?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"662\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091830-1024x662.png\" alt=\"\" class=\"wp-image-1409\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091830-1024x662.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091830-300x194.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091830-768x497.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091830.png 1045w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-b7593f2b03a640a1fe03aef4020775d0\">For our last task, we are focusing on ICMP!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"451\" height=\"183\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091918.png\" alt=\"\" class=\"wp-image-1410\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091918.png 451w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-091918-300x122.png 300w\" sizes=\"auto, (max-width: 451px) 100vw, 451px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"447\" height=\"367\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093122.png\" alt=\"\" class=\"wp-image-1411\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093122.png 447w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093122-300x246.png 300w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-24f13532a58f3d4ad4dbec42e8796f7f\">&#8220;What is the flag found in the exfiltrated data through ICMP?&#8221;<br><br>THM assists us with finding this flag. It&#8217;s still kind of hard to read, so what I did was copy the contents as base64, then used CyberChef to assist with getting it to read better.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"558\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093821-1024x558.png\" alt=\"\" class=\"wp-image-1412\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093821-1024x558.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093821-300x163.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093821-768x418.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093821.png 1394w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"347\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093710-1024x347.png\" alt=\"\" class=\"wp-image-1413\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093710-1024x347.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093710-300x102.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093710-768x260.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093710-1536x520.png 1536w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-06-093710.png 1910w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/tryhackme.com\/room\/dataexfildetectionCreated by: tryhackme, Dex01 There are two software we will be using in this lab: Wireshark and Splunk. In Task 3, THM goes over Data exfiltration and various threat actors and their data exfiltration methods. Pet THM, &#8220;Data exfiltration is the unauthorized transfer of data from an organization to an external destination controlled by an [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1386","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1386"}],"version-history":[{"count":4,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1386\/revisions"}],"predecessor-version":[{"id":1414,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1386\/revisions\/1414"}],"wp:attachment":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}