Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Exfiltration with CloakifyFactory

This course will teach you Exfiltration using CloakifyFactory.

Intermediate
20m
(4)

Created by Rishalin Pillay

Last Updated Oct 01, 2021

Course Thumbnail
  • Course

Exfiltration with CloakifyFactory

This course will teach you Exfiltration using CloakifyFactory.

Intermediate
20m
(4)

Created by Rishalin Pillay

Last Updated Oct 01, 2021

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Exfiltration consists of techniques that adversaries may use to steal data from your network. In this course, Exfiltration with CloakifyFactory, you’ll learn how to utilize CloakifyFactory to execute exfiltration techniques in a red team environment. First, you’ll discover exfiltration over C2. Next, you’ll apply exfiltration using a web service. Finally, you’ll simulate exfiltration over alternative protocol. When you’re finished with this course, you’ll have the skills and knowledge to execute techniques T1041, T1567.002, T1048.001 using CloakifyFactory. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Exfiltration with CloakifyFactory
Intermediate
20m
(4)
Table of contents

About the author
Rishalin Pillay - Pluralsight course - Exfiltration with CloakifyFactory
Rishalin Pillay
23 courses 4.5 author rating 149 ratings

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

Get started with Pluralsight