Whats the best way to get files off a work laptop? (2024)

Skip to content

IQfy

Know more.

  1. 3 days ago

    Reply

    Anonymous

    upload to mega

  2. 3 days ago

    Reply

    Anonymous

    Removing the hard drive from your workstation and plugging it in another computer.

    • 3 days ago

      Reply

      Anonymous

      Unless the laptop has a tamper evident seal, this is indeed a foolproof solution.

      • 3 days ago

        Reply

        Anonymous

        Encrypted hard drive can make it tricky too. Even if you do have the password.

      • 3 days ago

        Reply

        Anonymous

        As an IT guy : I never check the state of tamper seal. I just assume another colleague had to open it at some point.

        • 3 days ago

          Reply

          Anonymous

          This, no one ever checks. Or if they notice, they will assume it was opened by IT. Few normies would ever consider doing such a thing.

          • 3 days ago

            Anonymous

            I would encode all the information as barcodes, and use a cell phone to decode them, and in inobivious way would be man-in-the-middle wifi. There are at least 4 more ways that cannot be more openly discussed...

          • 3 days ago

            Anonymous

            > This, no one ever checks
            I wouldn't want to rely on this assumption if I was leaking docs in/from some totalitarian sh*thole or if for any other reason I wouldn't like being caught. Ask yourself why they put seals on the devices in the first place. If they don't do it on a regular basis, once they suspect a leakage they WILL check seals!

    • 3 days ago

      Reply

      Anonymous

      THIS is actually the safest or rather only safe way if anyhow possible. Why? Because Windows OS stores traces of whatever you do in it's registry and you would have to remove all these traces after you are done copying files. Nothing a layman should even consider. And this is just the caveat without the additional possibility of some monitoring software running in the background.

      If the hom*osexual would answer literally any questions [...]
      , and if unencrypted, a linux bootstick was absolutely going to be my suggestion too
      Did this throughout college.

      > a linux bootstick
      If I had say in IT security of some company I would only hand out laptops with a BIOS that doesn't allow to boot from devices other than the internal pre-installed drive, doesn't allow any changes to the BIOS itself. And of course I would seal the laptops and prohibit tampering with the internals. This is easy to accomplish. Depending on the required security level I would also install monitoring software that hides from the user.

      • 3 days ago

        Reply

        Anonymous

        If the physical device is at my home, I'd just MitM attack myself if it got so dire.

        • 3 days ago

          Reply

          Anonymous

          > MitM attack myself
          If you know how to tap the company's VPN. Do you?
          And you need a convincing pretext for even the need to send the documents via this connection.
          If, for example, documents get leaked I would suspect anyone who moved them around or just touched them unnecessarily. This is what monitoring software is intended for. Even trickier: imagine every employee getting identifiable unique documents that only seem identical to a human reader. This is what I would check first as a leaker. Always make sure they didn't set up any traps. And always behave plausible.

      • 3 days ago

        Reply

        Anonymous

        >BIOS that doesn't allow to boot from devices other than the internal pre-installed drive, doesn't allow any changes to the BIOS itself.
        Many companies do this or some version of it.

        • 3 days ago

          Reply

          Anonymous

          this, how can you circumvent it?

          • 3 days ago

            Anonymous

            It would pretty much eliminate that vector if the drive is encrypted.
            You'd be back to software options, which this thread is full of.

    • 3 days ago

      Reply

      Anonymous

      this is only half of the equation because if there is a DLP solution installed on the OS it'll hold that information until it's reconnected to the network and forward off logs to the DLP server saying that a USB was inserted into it at some point (the second computer). you really want to clone the hard drive to a PC that is disconnected from the internet (not the local network) and use a USB drive or locally transfer the file.

  3. 3 days ago

    Reply

    Anonymous

    >Asks for tech help
    >Gives no technical information about laptop
    Is the drive encrypted?
    What OS?
    Do you know if it's running any nanny/monitoring software?
    Is it a WFH VPN connection or are you physically in the office when using it?

    • 3 days ago

      Reply

      Anonymous

      This, but use a phone camera with an OCR app to copy the text instead.

    • 3 days ago

      Reply

      Anonymous

      That's how I would get content out of RDP sessions from clients with "secure access protocols". Shell encode to base64, use OCR screen reader to extract text, decode in npp. Wew lad so hard

  4. 3 days ago

    Reply

    Anonymous

    scp

  5. 3 days ago

    Reply

    Anonymous

    depends on what you have available to use and what data do you want to get out

    https://github.com/alisinabh/paperify or similar projects, there are many look at which allow for best data density
    encrypt > qrcode > print it > take it

    encrypt > upload to some free file hoster

  6. 3 days ago

    Reply

    Anonymous

    Exploit the analog hole.
    If you can't figure that one out you're too dumb to not get caught.

  7. 3 days ago

    Reply

    Anonymous

    Bros why did she do it

    • 3 days ago

      Reply

      Anonymous

      Because body dysphoria, social pressure and anxiety destroys people.

      • 3 days ago

        Reply

        Anonymous

        >millionaire
        >dysphoria, social pressure and anxiety
        kek what a b***hass

        • 3 days ago

          Reply

          Anonymous

          I'd much sooner indict the doctor(s) who did the work and didn't send her to a therapist first.

          • 3 days ago

            Anonymous

            Therapist don't make money flow through the pharmaceutic industry.

          • 3 days ago

            Anonymous

            An unfortunate truth.
            Hopefully her bogging stands as a warning to other women.

        • 3 days ago

          Reply

          Anonymous

          > mogging on people who make you suffer
          Weak. You're still horrified of her doings.

    • 3 days ago

      Reply

      Anonymous

      Because body dysphoria, social pressure and anxiety destroys people.

      >millionaire
      >dysphoria, social pressure and anxiety
      kek what a b***hass

      I'd much sooner indict the doctor(s) who did the work and didn't send her to a therapist first.

      Therapist don't make money flow through the pharmaceutic industry.

      An unfortunate truth.
      Hopefully her bogging stands as a warning to other women.

      As always I'm the one not understanding the meme. Who is she and what did she do?

      • 3 days ago

        Reply

        Anonymous

        Look up Erin Moriarty from the boys.
        Went from a soft faced girl next door cutie to a bog

      • 3 days ago

        Reply

        Anonymous

        Whats the best way to get files off a work laptop? (6)

        Look up Erin Moriarty from the boys.
        Went from a soft faced girl next door cutie to a bog

        at least she compensated with some nudity, so all is forgiven

        • 3 days ago

          Reply

          Anonymous

          I mean I'm into monster girls too, but i draw the line at Wendigos.

        • 3 days ago

          Reply

          Anonymous

          >when she takes off her makeup

  8. 3 days ago

    Reply

    Anonymous

    Whats the best way to get files off a work laptop? (7)

    >i want to take some documents but im afraid i'll be caught

    Good luck with that, better get your russian visa in order first. I'll see you on the news.

  9. 3 days ago

    Reply

    Anonymous

    Smb over a vpn

  10. 3 days ago

    Reply

    Anonymous

    Use python shell (not a script), read the file into memory, aes encrypt it with symmetric password, base64 encode it, print it to console, copy the text from the console and then use something like steam client or Rdp or ssh to copy+paste the text into a note pad on a remote machine you own at home or are renting in aws

    • 3 days ago

      Reply

      Anonymous

      Actually pretty clever, tbh. Over the top IMHO, but still clever.

  11. 3 days ago

    Reply

    Anonymous

    >write a program that turns data to audio
    >play audio file on laptop speakers, record it to your own computer
    >convert audio back to data
    wa la

    • 3 days ago

      Reply

      Anonymous

      Who remembers how long it took to load just 1KB this way on an Amstrad?

  12. 3 days ago

    Reply

    Anonymous

    Is that computer always on or do you turn it on when you begin to work? If it's off and the drive is not encrypted, you could boot it on some usb stick with Linux on it, this way any software installed in its OS to watch what you are doing will not be running, for the computer will be running your Linux usb stick instead.

    • 3 days ago

      Reply

      Anonymous

      If the hom*osexual would answer literally any questions

      >Asks for tech help
      >Gives no technical information about laptop
      Is the drive encrypted?
      What OS?
      Do you know if it's running any nanny/monitoring software?
      Is it a WFH VPN connection or are you physically in the office when using it?

      , and if unencrypted, a linux bootstick was absolutely going to be my suggestion too
      Did this throughout college.

  13. 3 days ago

    Reply

    Anonymous

    take photos

  14. 3 days ago

    Reply

    Anonymous

    >he bought?

  15. 3 days ago

    Reply

    Anonymous

    Bluetooth File Transfer

    nobody expects it, nobody even knows it is there

    >In Bluetooth & other devices settings, select Send or receive files via Bluetooth. In Bluetooth File Transfer, select Send files > choose the device you want to share to > Next. Select Browse > the file or files to share > Open > Next (which sends it) > Finish.

    • 3 days ago

      Reply

      Anonymous

      Some companies block bluetooth file transfer. Mine does.

      https://lulz.org/cdn/77485442105a551f9ed7eb7523aa0cf7.jpg

      i want to take some documents but im afraid i'll be caught as soon as i stick in a usb and copy the files or i email them to my personal address. Whats the most safest way of transferring these without being found out?

      OP, what I do is to log on to the web version of Telegram and send the file to myself via the web version. Don't know if this is 100% foolproof, but I work for a financial institution which is pretty locked up and this is the only way I've been doing for years without being caught.

      • 3 days ago

        Reply

        Anonymous

        does anyone ITT know a thing about forensics? kek

        >log on to the web version of Telegram and send the file to myself via the web version
        you need to trust your browser for that. and, you know, corporations install their own certificates in your browser for reasons...

  16. 3 days ago

    Reply

    Anonymous

    How much data are we talking about?
    30 bytes or 30 Terabytes?

  17. 3 days ago

    Reply

    Anonymous

    Whats the best way to get files off a work laptop? (8)

    dis pic s scary

  18. 3 days ago

    Reply

    Anonymous

    if you don't want to be discovered,
    it means you are doing something illegal.

    MODS

    • 3 days ago

      Reply

      Anonymous

      It may be illegal in North Korea but not in the US. We need to support dissidents in the sh*tholes of the world, they risk their lives if they leak info.

    • 3 days ago

      Reply

      Anonymous

      moronic moralgay

  19. 3 days ago

    Reply

    Anonymous

    If you don't want them seeing you send that file from the work machine (mail,browser,p2p..), why would you do the obfuscation part on that machine, too? The QR code, the printing, and all other conversions leave more traces than surfing to wetransfer, no?

  20. 3 days ago

    Reply

    Anonymous

    look up "data exfiltration" and make sure to use the most creative method that uses the least number of programs and sends the least data through the network.

  21. 3 days ago

    Reply

    Anonymous

    You could use a temp mail I guess, still kind of silly though imo

  22. 3 days ago

    Reply

    Anonymous

    Depends on how it's secured.
    Either way, look it up. Maybe they have a file share. Maybe Nextcloud. My company has internal S3 with buckets up to 50TB, for free (not billed rn).

  23. 3 days ago

    Reply

    Anonymous

    My employer locks down our work machines pretty tight but for some reason ssh is completely unrestricted so I just SFTP whatever i want onto my personal machine.

    • 3 days ago

      Reply

      Anonymous

      I love tech companies

      They always, without fail, miss or frick up something. Always.

      • 3 days ago

        Reply

        Anonymous

        Kek, they not a tech company. Just IT dept. full of compliancegays.

  24. 3 days ago

    Reply

    Anonymous

    >help me steal from my workplace
    >help me do this potentially very illegal thing
    HOLY FED POST

    • 3 days ago

      Reply

      Anonymous

      Fine with me
      They often hire people actually skilled and knowledgeable
      Hope they get my resume too

      • 3 days ago

        Reply

        Anonymous

        >>help me do this potentially very illegal thing
        Not a problem for me. Why, are you a puss*?

        why do you keep replying? why are you bumping your own thread, makes no sense. are you desperate. this post doesn't bump, i put sage in the options field. the only person who would bump this is hom*osexual OP, desperate incel loser who is going to steal documents from his workplace. sage and hide

        • 3 days ago

          Reply

          Anonymous

          Do you feel better now that you got that out, big boy?
          Sorry about your parental neglect.

    • 3 days ago

      Reply

      Anonymous

      >>help me do this potentially very illegal thing
      Not a problem for me. Why, are you a puss*?

  25. 3 days ago

    Reply

    Anonymous

    In large companies, lots of regular ways are closed off for security reasons.

    I used to backup my files to a USB Drive, but they started demanding encrypting the drive and that only worked well in Windows.

    So, I set up a fileserver in my home network and just rsync'd my directories to the spare drive using my pre-approved WSL instance. It was fast due to it being in the home network, and I never got any notice or exception.

Whats the best way to get files off a work laptop? (2024)

References

Top Articles
Percy Jackson and the Olympians (2023) – Viel mehr als Monster (Rezension) - Filme & Serien
Percy Jackson (ebook), Rick Riordan | 9780141352015 | Boeken | bol
Instructional Resources
Get train & bus departures - Android
Camstreams Download
Detroit Lions 50 50
Aces Fmc Charting
Fairy Liquid Near Me
Craigslist Apartments In Philly
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis - NFL
Bowie Tx Craigslist
Sky X App » downloaden & Vorteile entdecken | Sky X
Paradise leaked: An analysis of offshore data leaks
Troy Bilt Mower Carburetor Diagram
Classic | Cyclone RakeAmerica's #1 Lawn and Leaf Vacuum
H12 Weidian
Beryl forecast to become an 'extremely dangerous' Category 4 hurricane
Shopmonsterus Reviews
Project, Time & Expense Tracking Software for Business
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
Keci News
The Creator Showtimes Near R/C Gateway Theater 8
Jesus Revolution Showtimes Near Regal Stonecrest
Skidware Project Mugetsu
Sacramento Craigslist Cars And Trucks - By Owner
Ts Modesto
Street Fighter 6 Nexus
Emiri's Adventures
Miss America Voy Board
Strange World Showtimes Near Regal Edwards West Covina
Envy Nails Snoqualmie
Plato's Closet Mansfield Ohio
Darrell Waltrip Off Road Center
Indiana Wesleyan Transcripts
Wildfangs Springfield
Umiami Sorority Rankings
Babylon 2022 Showtimes Near Cinemark Downey And Xd
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
Lbl A-Z
Citroen | Skąd pobrać program do lexia diagbox?
30 Years Of Adonis Eng Sub
Autozone Battery Hold Down
Perc H965I With Rear Load Bracket
Port Huron Newspaper
Huntsville Body Rubs
Graduation Requirements
House For Sale On Trulia
Best Restaurant In Glendale Az
Mail2World Sign Up
Acellus Grading Scale
Bunbrat
Volstate Portal
Latest Posts
Article information

Author: Ms. Lucile Johns

Last Updated:

Views: 6496

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Ms. Lucile Johns

Birthday: 1999-11-16

Address: Suite 237 56046 Walsh Coves, West Enid, VT 46557

Phone: +59115435987187

Job: Education Supervisor

Hobby: Genealogy, Stone skipping, Skydiving, Nordic skating, Couponing, Coloring, Gardening

Introduction: My name is Ms. Lucile Johns, I am a successful, friendly, friendly, homely, adventurous, handsome, delightful person who loves writing and wants to share my knowledge and understanding with you.