File Transfers

This module covers file transfer techniques leveraging tools commonly available across all versions of Windows and Linux systems.

Introduction

  • Understanding different ways to perform file transfers and how networks operate can help us accomplish our goals during an assessment.

  • We must be aware of host controls that may prevent our actions, like application whitelisting or AV/EDR blocking specific applications or activities.

  • File transfers are also affected by network devices such as Firewalls, IDS, or IPS which can monitor or block particular ports or uncommon operations.

Last updated