
CloakifyFactory
#Security Testing#Offensive Security
A blog post discussing the often overlooked dangers of CSV injection in applications.
CloakifyFactory & the Cloakify Toolset: An Overview of Data Exfiltration Techniques
CloakifyFactory & the Cloakify Toolset
- Data Exfiltration & Infiltration in Plain Sight; Evade DLP/MLS Devices; Utilize Social Engineering on Analysts; Bypass Data Whitelisting Controls; Evade AV Detection.
Text-based steganography employing lists.
Transform any file type (e.g., executables, Office documents, Zip files, images) into a list of common strings.
These tools are very simple, yet they embody a powerful concept, limited only by your creativity.
(Update 05/27/2020: Yes, I will be transitioning all of my Github projects to Python3 during the summer of 2020.)
Author: Joe Gervais (TryCatchHCF)
Understanding DLP Systems, MLS Devices, and SecOps Analysts
Why DLP systems, MLS devices, and SecOps analysts know what data to look for: The goal is to transform that data into something they aren't actively searching for. For a comprehensive guide, refer to my DEF CON 24 slides (included in the project) from the Crypto & Privacy Village workshop and DemoLabs session. This tutorial covers what the Cloakify Toolset can accomplish, its specific use cases, and much more. (Note that the examples in the presentation utilize standalone scripts; however, I recommend using the new CloakifyFactory to enhance your efficiency.)
Getting Started with CloakifyFactory
To quickly begin using CloakifyFactory, refer to the aptly named file 'README_GETTING_STARTED.txt' in the project. This file provides a comprehensive walkthrough.
Overview of CloakifyFactory Transformations
Overview of CloakifyFactory transformations.