Skip to content

File transfer base64

lethanhtung01011980 edited this page Apr 21, 2020 · 3 revisions

Goals

  • To transfer simple binary/text files using base64
  • Can use for binary file, too.

Windows victim

Encode file to a temp file

  • In Victim PC: certutil -encode 0792c32e-48a5-4fe3-8b43-d93d64590580 C:\temp\caca

Linux victim

Encode file using base64

  • In victim PC: cat to-copied-file | base64 > base64encode

To copy and decode file using base64

  • To copy and paste the content of "base64encode" to new file in attacker PC
  • To convert back to original file: cat base64encode | base64 -d > to-copied-file

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally