interactsh icon indicating copy to clipboard operation
interactsh copied to clipboard

Adding exfiltrate data option

Open vrechson opened this issue 1 year ago • 3 comments

Hello, I created the -ed option to exfiltrate data. When enabled, it will analyze every DNS request and look for the following pattern: content.filename.extension.interactshdomain.tld. When the pattern matches, it will append every content sent to filename.extension, which means that changing this subdomains you may exfiltrate different files. I also added an example in the readme and the -silent option that will only hide the banner.

vrechson avatar Apr 19 '24 03:04 vrechson

Thanks so much for your contribution @vrechson , we appreciate it!

We also have a Discord server, which you’re more than welcome to join. It's a great place to connect with fellow contributors and stay updated with the latest developments!

GeorginaReeder avatar Apr 19 '24 08:04 GeorginaReeder

@vrechson Thanks for this PR. Could you describe a bit more the use case of this functionality? Are you using interactsh within a pipeline or as SDK? In the second case maybe a callback system would be more functional, allowing to customize the behavior dynamically?

Mzack9999 avatar May 08 '24 09:05 Mzack9999

@vrechson Thanks for this PR. Could you describe a bit more the use case of this functionality? Are you using interactsh within a pipeline or as SDK? In the second case maybe a callback system would be more functional, allowing to customize the behavior dynamically?

Example: You are in a pentest and are asked to demonstrate the impact of a RCE in an enviroment where there is only DNS outbound. With this option you can exfiltrate a file such as /etc/passwd encoded in hex or base64 using multiple DNS interactions and it will concatenate the content back into a file.

vrechson avatar May 08 '24 22:05 vrechson