DataLeakTest
DLP Validation and Testing

 please contribute by turning off ad blockers for this site 

Your public IP address is: 18.232.186.117; more info

Updated 3/10/2020

 

SSL is: on ; more info

DLP Auditor

POST Test

GET Test

Upload Test

Email Test

FTP Testing

Session Info

About DLT

Data Loss Prevention (DLP) Post WebForm Data Self Test

Built by Engineers for Engineers

  This page is used to test data leakage out to the web using the POST method. Read below for more info.

 
DLP for O365, Gmail, Box, DropBox, OneDrive, Gdrive, Teams, Slack and more!

Gamma

1) Select SSL OFF or SSL ON (currently on)

2) Insert data into the box below and then click "POST TEST" to attempt leakage

3) A results page will display any data leaked


 *Function: data is loaded into DataLeakTest.com web server memory then displayed on the next page. The data is not retained when your session ends.

sample-data.csv     sample-data.pdf     sample-data.xls     Page

SSL is on ; it is much more challenging for Data Security tools to detect a leak over SSL.

Turn SSL OFF

Turn SSL ON

How to use this page (3 min)

Data Security testing: use this site to test controls that trigger security functions

Enterprise DLP testing: visit this page from inside your enterprise to test for data leakage policy compliance.

Endpoint DLP testing: visit this page from any corporate computing device to test detection and prevention of Endpoint DLP solutions.

Cloud Data Theft testing: visit this page from your cloud database server to test the ability to leak test data -simulating mass data exfiltration or abnormal data behavior.

CASB: in full cloud proxy deployments this site can be used to test advanced CASB DLP capabilities.

The "POST" data leakage method should be detected by all network and endpoint based Data Security tools and is the most common way data is leaked through a browser. This is our most popular test.

 

POST is the most common method used to leak data over web pages. Social media sites, blogs, forums, web based email, as well as botnet/ back door, malware phone home, and data theft tools often use this method to "exfiltrate" or steal data.

POST is a method of upload from a web page form where the page variables (form data) are pushed up to the server. In this case when the "Submit" button is pushed the variables/ data are sent to the server to be used to build the content of the following page. If the Data Security product worked a block page will be displayed. If the page displays showing your data then the data was successfully leaked to the world.

*Data posted through the "POST" form is not collected or stored

 

---ads here to fund our site, please turn ad blockers off---


Donate to help build free tools: donations help to pay the bills

---ads here to fund our site, please turn ad blockers off---


Free expert DLP help from top experts

 

 

Have data security questions? Want expert advice? Just want to say hello or give suggestions?

Please use the form to instantly message our team.
Name:  
Email:  
Phone:  
Message:

---ads here to fund our site, please turn ad blockers off---


---ads here to fund our site, please turn ad blockers off---


 


2020 IGNITE Cyber Security