1. Command and Scripting Interpreter. 2. Exploitation for Client Execution. 3. Nativ API. 4. Scheduled Tasks or Jobs. 5. Software Deployment Tools. 6. User Execution.
1. Archive Collected Data. 2. Audio Capture. 3. Automated Collection. 4. Clipboard Data. 5. Data from Information Repositories. 6. Data from Local System. 7. Data from Network Shared Drive. 8. Data from Removable Media. 9. Data Staged. 10. Input Capture. 11. Man-in-the-Middle (MiTM) Attacks. 12. Screen Capture.
1. Automated Exfiltration. 2. Data Transfer Size Limits. 3. Exfiltration Over Alternative Protocol. 4. Exfiltration Over C2 Channel. 5. Exfiltration Over Other Network Medium. 6. Exfiltration Over Other Physical Medium. 7. Exfiltration Over Web Services. 8. Scheduled Transfers.
Impact of UNIX Servers Hack
1. Account Access Removal. 2. Data Destruction. 3. Data Encrypted for Impact. 4. Data Manipulation. 5. Defacement. 6. Disk Wipe. 7. Endpoint Denial of Service. 8. Firmware Corruption. 9. Inhibit System Recovery. 10. Network Denial of Service. 11. Resource Hijacking. 12. System Shutdown/Reboot.