netcat
Start a listener on the target machine:
If the compromised machine is using Ncat, we’ll need to specify --recv-only
to close the connection once the file transfer is finished:
Connect to the target machine from attacker machine and send in the file:
When using ncat, we need to specify --send-only
:
Powershell
We can use PowerShell Remoting.
But we will need an admin access and winrm access for this.
Let’s say we are moving file from DC01 to DATABASE01.
Test the WinRM connection on DATABASE01:
Create session variable to the remote target:
Copy file we want to transfer to DATABASE01 session:
We can also copy file from DATABASE01 to DC01:
RDP
We can usually copy-paste but sometimes this might not work.
We can mount folder to be safe.
Using redesktop:
Using xfreerdp: