Skip to content

File transfer Debug

lethanhtung01011980 edited this page Dec 12, 2019 · 6 revisions

Goals

  • For 32-bit Windows
  • use non-interactive echo commands to write out the binary file in its hex value equivalents
  • Then use debug.exe to assemble the written text file into a binary file
  • There is a 64k byte size limit to the files that can be created by debug.exe

Make the transmitted file smaller

To make nc.exe smaller

  • Location: /usr/share/windows-binaries/nc.exe
  • upx -9 nc.exe

Convert transmitted file to TEXT file

  • debug.exe is used by exe2bat
  • locate exe2bat
  • /usr/share/windows-binaries/exe2bat.exe
  • wine /usr/share/windows-binaries/exe2bat.exe nc.exe nc.txt
  • head nc.txt image

Copy and paste to non-interactive remote shell

  • To copy content of the above file in a non-interactive remote shell
  • To execute and download a file

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally