{"id":1320,"date":"2023-12-05T20:27:34","date_gmt":"2023-12-05T12:27:34","guid":{"rendered":"https:\/\/www.ruianding.com\/blog\/?p=1320"},"modified":"2024-09-09T23:39:10","modified_gmt":"2024-09-09T15:39:10","slug":"attck-for-enterprise-exfiltration","status":"publish","type":"post","link":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/","title":{"rendered":"ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration"},"content":{"rendered":"\n<p><a href=\"https:\/\/attack.mitre.org\/tactics\/TA0010\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exfiltration, Tactic TA0010 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae<\/a><\/p>\n\n\n\n<p><strong>&#8220;Exfiltration&#8221;<\/strong> in the context of cybersecurity refers to the unauthorized transfer of data from a computer or other device. This tactic, often seen in <strong>data breaches <\/strong>and<strong> espionage<\/strong> \u2460, aims to stealthily acquire sensitive information such as <strong>personal data<\/strong>, <strong>corporate secrets<\/strong>, or <strong>intellectual property<\/strong>. Attackers employ various methods for exfiltration, including network transfers, email, physical media like USB drives, or cloud storage services, while prioritizing stealth to evade detection. These acts can closely mimic legitimate network activity, making detection challenging. The consequences of exfiltration are severe, potentially leading to significant data loss, financial and reputational damage, and legal issues. This blog will explore and categorize specific alerts from&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/learn.microsoft.com\/en-us\/defender-for-identity\/other-alerts\" target=\"_blank\">Other security alerts<\/a>&nbsp;documentation.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2460 <strong>Espionage<\/strong> refers to the practice of using <strong>spies<\/strong> to obtain secret or confidential information without the permission of the holder of the information. It is commonly associated with government and military efforts to gather intelligence on other nations, but it can also occur in corporate settings, known as industrial or corporate espionage.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2480\" height=\"907\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png\" alt=\"\" class=\"wp-image-1334\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><a rel=\"noreferrer noopener\" href=\"https:\/\/attack.mitre.org\/techniques\/T1048\" target=\"_blank\">T1048 Exfiltration Over Alternative Protocol<\/a><\/h3>\n\n\n\n<p>Adversaries can exfiltrate data using protocols different from their main <strong><a href=\"https:\/\/zhuanlan.zhihu.com\/p\/54810155?utm_id=0\" target=\"_blank\" rel=\"noreferrer noopener\">command and control (C2) channel<\/a><\/strong>, potentially also directing the data to a different network location than the primary C2 server. These alternate protocols can include FTP, SMTP, HTTP\/S, DNS, SMB, or other network protocols not used for main C2 communication. Adversaries might encrypt or obfuscate these channels. Common operating system utilities like Net\/SMB or FTP can facilitate this on various platforms, while tools like curl on macOS and Linux can invoke HTTP\/S or FTP\/S for data exfiltration. Additionally, IaaS and SaaS platforms like Microsoft Exchange, SharePoint, GitHub, and AWS S3 allow direct downloading of files and sensitive information via web consoles or Cloud APIs, which can be exploited for exfiltration purposes.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><strong>External ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Sev.<\/strong><\/td><td><strong>Description<\/strong><\/td><\/tr><tr><td>2031<\/td><td>Suspicious communication over DNS<\/td><td>Medium<\/td><td><strong>Nature of the Attack<\/strong>: The attack involves the use of the DNS protocol by an attacker who has compromised a machine within an organization\u2019s network.<br>Malicious actors can manipulate DNS queries and responses to transmit data covertly. This can be done in several ways, including using DNS requests to communicate with a command and control server, or to exfiltrate data from a compromised network.<br><strong>Data Exfiltration<\/strong>: Stealthily sending sensitive information from the compromised machine to an external server using DNS queries. \u2460<br><strong>Command and Control<\/strong>: Using DNS queries to receive commands from a remote attacker. This can help in maintaining control over the compromised machine and potentially facilitating further malicious activities.<br><strong>Evading Network Restrictions<\/strong>: DNS is rarely blocked or restricted in corporate networks, allowing attackers to use it to bypass network security measures.<\/td><\/tr><tr><td>2030<\/td><td>Data exfiltration over SMB<\/td><td><strong>HIgh<\/strong><\/td><td><strong>Target and Motive<\/strong>: The primary target in this attack is the domain controller, which holds the most sensitive data within an organization.<br>Attackers aim to gain access to these domain controllers to steal critical information. One of their main objectives is often to acquire the <code>Ntds.dit<\/code> file \u2461.<br><strong>Significance of the Ntds.dit File<\/strong>: The <code>Ntds.dit<\/code> file, stored on the domain controller, is a database that contains all of the information of an Active Directory, including user accounts and passwords.<br>Exfiltration of this file is particularly dangerous because it allows attackers to potentially forge Kerberos TGTs<br><strong>Forging Kerberos TGTs<\/strong>:<br>With forged Kerberos TGTs, attackers can gain unauthorized access to virtually any resource in the network. They can manipulate the ticket expiration to extend their access as long as needed, which significantly elevates the risk and potential impact of the attack.<br><strong>Method of Exfiltration<\/strong>: The data is exfiltrated over SMB \u2462, a network file sharing protocol. This method involves suspicious transfers of data from the monitored domain controllers, which can be a sign of active exfiltration.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background has-small-font-size\">\u2460 <strong>&#8220;Stealthily sending sensitive information from a compromised machine to an external server using DNS queries&#8221;<\/strong> involves embedding sensitive data into DNS requests by malware on the compromised computer. These altered DNS requests, appearing normal, are sent to a DNS server controlled by the attacker. Since <strong>DNS requests typically bypass firewall scrutiny<\/strong> due to their essential role in network operations, they can exit the internal network without raising alarms. The attacker&#8217;s external DNS server receives these requests and extracts the encoded data. This method is challenging to detect because malicious DNS queries blend in with legitimate traffic, exploiting the general trust in and necessity of DNS communications within networks.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2461 <strong>The NTDS.DIT file<\/strong> is a database file on Windows Active Directory domain controllers that contains all Active Directory data, including user accounts and passwords. Typically, this file is located in the <strong>%SystemRoot%\\NTDS<\/strong> directory. In most cases, this translates to <strong>C:\\Windows\\NTDS\\NTDS.DIT<\/strong><br>The NTDS.DIT file, containing sensitive information, <strong>is usually not directly visible or accessible<\/strong> <strong>to regular users or administrators<\/strong>. To view or access this file, specific system privileges and tools are required. Normally, such operations are only carried out by system administrators during maintenance or under special circumstances.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1234\" height=\"853\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-10.png\" alt=\"\" class=\"wp-image-1328\" style=\"width:617px;height:427px\"\/><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2462 In the context of data exfiltration, attackers might utilize the SMB protocol to illicitly transfer data from a domain controller. However, <strong>this does not mean that the NTDS.DIT file itself is shared via standard file-sharing methods<\/strong>. <br>Attackers could potentially access this file by obtaining sufficient privileges or exploiting system vulnerabilities, using SMB as a transport mechanism to move or copy the file or its data from the domain controller to a location under their control.<\/p>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\" id=\"SAMDATABASE\"><a href=\"#SAMDATABASE\">\ud83d\udd17<\/a> The <strong>NTDS.DIT file<\/strong> and the <strong>SAM file<\/strong> are both important in the context of Windows security, but they serve different purposes and are located in different parts of the system.<br><strong>NTDS.DIT File: <\/strong>The NTDS.DIT file is a database file located on Active Directory domain controllers. It is a central component of the Windows Active Directory environment, containing comprehensive information about the domain. This includes user accounts, their <strong>password hashes<\/strong> (which are encrypted forms of passwords used for authentication), <strong>group policies<\/strong>, <strong>user rights<\/strong>, and other <strong>domain-level data<\/strong>. The password hashes stored in NTDS.DIT are crucial for maintaining security across the domain, as they are used for verifying user credentials during the login process.<br><strong>SAM File:<\/strong> The SAM file, on the other hand, is located on every Windows computer and stores local user account information. T<strong>his file contains user account details and password hashes for users on that specific machine.<\/strong> It is used to manage local access to the computer. The SAM file&#8217;s scope is limited to the individual system, unlike <strong>NTDS.DIT which has domain-wide significance<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1245\" height=\"702\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-9.png\" alt=\"\" class=\"wp-image-1326\" style=\"width:623px;height:351px\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Exfiltration, Tactic TA0010 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Exfiltration&#8221; in the context of cybersecurity refers to the unauthorized transfer of data from a computer or other device. This tactic, often seen in data breaches and espionage \u2460, aims to stealthily acquire sensitive information such as personal data, corporate secrets, or intellectual property. Attackers employ various [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[50],"tags":[],"class_list":["post-1320","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ATT&amp;CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ATT&amp;CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"og:description\" content=\"Exfiltration, Tactic TA0010 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Exfiltration&#8221; in the context of cybersecurity refers to the unauthorized transfer of data from a computer or other device. This tactic, often seen in data breaches and espionage \u2460, aims to stealthily acquire sensitive information such as personal data, corporate secrets, or intellectual property. Attackers employ various [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\" \/>\n<meta property=\"og:site_name\" content=\"\u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T12:27:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T15:39:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2480\" \/>\n\t<meta property=\"og:image:height\" content=\"907\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ruian Ding\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruian Ding\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\"},\"author\":{\"name\":\"Ruian Ding\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"headline\":\"ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration\",\"datePublished\":\"2023-12-05T12:27:34+00:00\",\"dateModified\":\"2024-09-09T15:39:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\"},\"wordCount\":1089,\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png\",\"articleSection\":[\"CyberSecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\",\"name\":\"ATT&CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png\",\"datePublished\":\"2023-12-05T12:27:34+00:00\",\"dateModified\":\"2024-09-09T15:39:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png\",\"width\":2480,\"height\":907},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ruianding.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\",\"url\":\"https:\/\/www.ruianding.com\/blog\/\",\"name\":\"Ruian's Tech Troubleshooting Toolbox\",\"description\":\"Debug the World.\",\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"alternateName\":\"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\",\"name\":\"Ruian Ding\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"width\":284,\"height\":284,\"caption\":\"Ruian Ding\"},\"logo\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\"},\"description\":\"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.\",\"sameAs\":[\"https:\/\/www.ruianding.com\"],\"url\":\"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ATT&CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/","og_locale":"en_US","og_type":"article","og_title":"ATT&CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT","og_description":"Exfiltration, Tactic TA0010 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Exfiltration&#8221; in the context of cybersecurity refers to the unauthorized transfer of data from a computer or other device. This tactic, often seen in data breaches and espionage \u2460, aims to stealthily acquire sensitive information such as personal data, corporate secrets, or intellectual property. Attackers employ various [&hellip;]","og_url":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/","og_site_name":"\u6781\u7b80IT\uff5cSimpleIT","article_published_time":"2023-12-05T12:27:34+00:00","article_modified_time":"2024-09-09T15:39:10+00:00","og_image":[{"width":2480,"height":907,"url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png","type":"image\/png"}],"author":"Ruian Ding","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruian Ding","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#article","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/"},"author":{"name":"Ruian Ding","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"headline":"ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration","datePublished":"2023-12-05T12:27:34+00:00","dateModified":"2024-09-09T15:39:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/"},"wordCount":1089,"publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png","articleSection":["CyberSecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/","url":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/","name":"ATT&CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png","datePublished":"2023-12-05T12:27:34+00:00","dateModified":"2024-09-09T15:39:10+00:00","breadcrumb":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#primaryimage","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png","width":2480,"height":907},{"@type":"BreadcrumbList","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ruianding.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration"}]},{"@type":"WebSite","@id":"https:\/\/www.ruianding.com\/blog\/#website","url":"https:\/\/www.ruianding.com\/blog\/","name":"Ruian's Tech Troubleshooting Toolbox","description":"Debug the World.","publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"alternateName":"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b","name":"Ruian Ding","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","width":284,"height":284,"caption":"Ruian Ding"},"logo":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/"},"description":"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.","sameAs":["https:\/\/www.ruianding.com"],"url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/comments?post=1320"}],"version-history":[{"count":15,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1320\/revisions"}],"predecessor-version":[{"id":1940,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1320\/revisions\/1940"}],"wp:attachment":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/media?parent=1320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/categories?post=1320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/tags?post=1320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}