Exfiltration (9 techniques)

Stealing data from the network.

The Exfiltration tactic groups MITRE ATT&CK techniques used by adversaries to stealing data from the network. Each technique below has its own page with detection guidance, platforms, and sub-techniques.

Detection engineering training, taught by practitioners.

Learn how to build real detections across the MITRE ATT&CK framework.

View Courses