Linux
Uploading Files to Victims in Linux
1. Python Web Server
This method leverages Python’s built-in HTTP server functionality to quickly transfer files. It is useful when you're on a network and need to serve files over HTTP.
Attacking Machine Command:
Victim Machine Command:
or
Explanation: You start a simple HTTP server on your attacking machine (usually on port 80). On the victim's machine, they can download the file using wget
or curl
.
2. SCP (Secure Copy Protocol)
This method uses SSH to securely transfer files between systems. It is often used when SSH access to the victim machine is available.
Attacking Machine Command:
Explanation: The attacking machine uses the scp
command to securely copy a file to the victim machine’s specified directory.
3. Netcat
Netcat can be used as a simple and effective way to send files to a victim machine, leveraging its capability to listen for incoming connections and send data.
Victim Machine Command:
Attacking Machine Command:
Explanation: On the victim’s machine, you set up nc
to listen on port 4444 for incoming data, which gets written to a file. On the attacking machine, you pipe the file you want to send into nc
, which sends it over the network to the victim.
4. FTP (File Transfer Protocol)
Using an FTP server allows for a more traditional file transfer protocol, but it might be slower or less stealthy compared to other methods like SCP or Netcat.
Attacking Machine Command:
Victim Machine Command:
Explanation: On the attacking machine, you run an FTP server using twistd
, which allows the victim to connect to it and download files. The victim can retrieve files using the wget
command.
Downloading Victim Files in Linux
1. Python Web Server
You can quickly set up a Python HTTP server to serve files from the victim machine to the attacker.
Victim Machine Command:
Attacking Machine Command:
Explanation: The victim machine serves files over HTTP via Python’s built-in SimpleHTTPServer
. The attacking machine can retrieve these files with wget
.
2. Netcat
Netcat is just as effective for receiving files as it is for sending them. You can use it to listen for files being sent from the victim.
Attacking Machine Command:
Victim Machine Command:
Explanation: The attacker listens on port 4444 for incoming data and saves it as FileToDownload
. The victim machine sends the file to the attacking machine using nc
.
3. SCP (Secure Copy Protocol)
If you have SSH access to the victim machine, SCP is a secure and efficient way to download files.
Attacking Machine Command:
Explanation: You use the scp
command to securely copy a file from the victim machine to your local system, using SSH authentication.
Last updated