Jump to content

File:Data Exfiltration Methods.jpg

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
From Wikipedia, the free encyclopedia

Data_Exfiltration_Methods.jpg (591 × 298 pixels, file size: 25 KB, MIME type: image/jpeg)

Summary

Description
English: The most commonly used methods used to perform Data Exfiltration
Date
Source Own work
Author Iammrsantos
This image could be re-created using vector graphics as an SVG file. This has several advantages; see Commons:Media for cleanup for more information. If an SVG form of this image is available, please upload it and afterwards replace this template with {{vector version available|new image name}}.


It is recommended to name the SVG file “Data Exfiltration Methods.svg”—then the template Vector version available (or Vva) does not need the new image name parameter.

Licensing

I, the copyright holder of this work, hereby publish it under the following license:
w:en:Creative Commons
attribution share alike
This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license.
You are free:
  • to share – to copy, distribute and transmit the work
  • to remix – to adapt the work
Under the following conditions:
  • attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

1 July 2018

image/jpeg

c730bb4ea3bbb3f4e1ec44fa4c16673841f1ffb0

25,948 byte

298 pixel

591 pixel

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current05:13, 2 July 2018Thumbnail for version as of 05:13, 2 July 2018591 × 298 (25 KB)IammrsantosMain types of data exfiltration techniques
04:49, 2 July 2018Thumbnail for version as of 04:49, 2 July 2018624 × 515 (37 KB)IammrsantosUser created page with UploadWizard

The following page uses this file:

Global file usage

The following other wikis use this file: