How I met your shell
CtrlK
CPTS
CPTS
  • From beginners to beginners
  • Introduction & Getting Started
    • Shells & SSH
      • Setting up Shells
    • Knowledge Check
  • Enumeration & Attack Planning
    • Nmap
      • Host Discovery
      • Port Scanning
      • IDS/IPS Evasion
      • NSE
      • Skill Assessments
    • Footprinting
      • Infrastructure-Based Enumration
        • Domain Information
        • Cloud Resources
      • Host-Based Enumeration
        • (21)FTP
        • (139,445)SMB
        • (111,2049 for NFSv4.1)NFS
        • SMTP(25/465(enc)/587(newer))
        • DNS
        • (143,993)IMAP/POP3(110,995)
        • (161 UDP)SNMP
        • (3306)MySQL
        • (1433)MSSQL
        • (1521)Oracle TNS
        • (623 UDP)IPMI
      • Skill Assessments
    • Information Gathering - Web Edition
      • WHOIS
      • DNS & Subdomains
        • Digging DNS
        • Subdomains & VHosts
      • More Fingerprinting
      • Crawling
    • Password Attacks
      • John The Ripper
      • Misc
      • Local Windows Password Attacks
      • Linux PtT
      • Windows PtT
  • Exploitation & Lateral Movement
    • Web Shells & Payloads
      • Skill Assessment
    • Metasploit
      • Modules, targets
      • External Modules
      • Plugins & Mixins
      • Databases
      • Sessions & Jobs
      • Payloads
      • Encoders
      • msfvenom
      • Meterpreter
  • Post exploitaion
    • File Transfers
      • Linux File Transfer Methods
      • Windows File Transfer Methods
      • Transferring Files with Code
  • Reporting
    • In-Progress...
  • Malware Analysis Prep
Powered by GitBook
On this page
  1. Post exploitaion
  2. File Transfers

Transferring Files with Code

Under Construction. Content will be published soon 😄

PreviousWindows File Transfer MethodsNextIn-Progress...

Last updated 9 months ago