AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Exfiltration Method and Critique, plus an Ad for DeleteMe
The chapter discusses the attackers' exfiltration method in the Equifax breach, where customer data was divided into compressed files and downloaded using WGet. The speakers criticize the old and noisy methodology used by the attackers.