File Transfers

Sometimes, during the course of a pentest or CTF event, you’ll need to transfer a file from one system to another via the command line. Perhaps you need to exfiltrate a file containing a bunch of passwords, or copy a compiled exploit to a target system. The following sections will reveal various ways of accomplishing these tasks using basic tools commonly found on systems in the wild.