Compressive Guide to File Transfer (Post Exploitation)
In penetration testing, generally we get stuck when we transfer or download any file from compromised machine or other host machine in a network. Therefore today you will learn which method you should follow for downloading any file from compromised or other host system. All following methods are helpfully in penetration testing and also used for general purpose.
Lets starts!!
File transfer Protocol (FTP)
You all are familiar with the working of FTP server their let’s start today’s tutorial from FTP service.
When you found port 21 is open, it means FTP service is running on remote machine and you are actively looking for downloading a text file from destination machine then you can follow below 2 methods.
1st method use command-line
First connect to ftp server using host IP, enter login credential and then execute get command with file name you want to download.
FUll Article Read Here