Data Exfiltration Techniques Using Metasploit and ICMP | TryHackMe
This walkthrough covers data exfiltration methods utilizing the ICMP protocol and the Metasploit Framework.

Motasem Hamdan
6.6K views • Sep 5, 2022

About this video
In this video walk-through, we covered Data Exfiltration through ICMP Protocol and Metasploit Framework.
**********
Receive Cyber Security Field Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
*******
Instagram
https://www.instagram.com/dev.stuxnet/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Website
https://www.motasem-notes.net
Patreon
https://www.patreon.com/motasemhamdan?fan_landing=true
Backup channel
https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ
My Movie channel:
https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA
******
**********
Receive Cyber Security Field Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
*******
https://www.instagram.com/dev.stuxnet/
https://twitter.com/ManMotasem
https://www.facebook.com/motasemhamdantty/
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Website
https://www.motasem-notes.net
Patreon
https://www.patreon.com/motasemhamdan?fan_landing=true
Backup channel
https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ
My Movie channel:
https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA
******
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
6.6K
Likes
89
Duration
24:21
Published
Sep 5, 2022
User Reviews
4.5
(1)