i unfortunately don’t have the link on hand, but i once saw this video of a pentesting team doing data exfiltration with qr codes. they converted the file to base64, split it into chunks that would be easy to scan on a phone, converted the base64 to a qr code, and took a video with their phone to reassemble later.
i unfortunately don’t have the link on hand, but i once saw this video of a pentesting team doing data exfiltration with qr codes. they converted the file to base64, split it into chunks that would be easy to scan on a phone, converted the base64 to a qr code, and took a video with their phone to reassemble later.