File Transfers
This module covers file transfer techniques leveraging tools commonly available across all versions of Windows and Linux systems.
Introduction
Understanding different ways to perform file transfers and how networks operate can help us accomplish our goals during an assessment.
We must be aware of host controls that may prevent our actions, like application whitelisting or AV/EDR blocking specific applications or activities.
File transfers are also affected by network devices such as Firewalls, IDS, or IPS which can monitor or block particular ports or uncommon operations.
Last updated