File Transfer Techniques for Pentesting
Overview
File transfer techniques are critical for penetration testing, especially in restricted environments. This guide covers both Windows and Linux methods, with practical commands and methodologies.
Common Challenges
Host-based Controls
Application whitelisting
AV/EDR blocking
Process monitoring
Network Controls
Firewall restrictions
IDS/IPS monitoring
Port filtering
Windows Transfer Techniques
PowerShell Methods
Base64 Transfer (No Network Required)
Web Downloads
SMB Transfer
FTP Transfer
Living Off The Land (LOtL) Binaries
WMIC
Bitsadmin
Certutil
Regsvr32
Linux Transfer Techniques
Base64 Transfer
Web Transfer Methods
Download
Upload
SSH/SCP Transfer
Simple Web Server
Common Issues & Solutions
SSL/TLS Issues (Windows)
Port Considerations
HTTP/HTTPS (80/443) - Usually allowed
SMB (445) - Often blocked
FTP (20/21) - May be filtered
SSH/SCP (22) - May require configuration
Security Best Practices
Transfer Verification
Always verify file integrity (MD5/SHA)
Check file permissions after transfer
Operational Security
Clean up temporary files
Remove credentials after use
Monitor for security alerts
Use encryption when possible
Fileless Operations
Prefer memory-only operations
Clean up artifacts
Be aware of logging/monitoring
Network Security
Use HTTPS/FTPS when available
Consider file size limitations
Monitor for AV/EDR alerts