File Transfers
There are many situations when transferring files to or from a target system is necessary. File transfer is a core feature of any operating system, and many tools
exist to achieve this. However, many of these tools may be blocked or
monitored by diligent administrators, and it is worth reviewing a range
of techniques that may be possible in a given environment. This module covers techniques that leverage tools and applications commonly available on Windows and Linux systems.
Windows File Transfer Methods
Understanding file transfer in Windows can help both attackers and
defenders. Attackers can use various file transfer methods to operate
and avoid being caught. Defenders can learn how these methods work to
monitor and create the corresponding policies to avoid being
compromised. The term
fileless
suggests that a threat doesn't come in a
file, they use legitimate tools built into a system to execute an
attack. This doesn't mean that there's not a file transfer operation. The Astaroth attack
generally followed these steps: A
malicious link in a spear-phishing email led to an LNK file. When
double-clicked, the LNK file caused the execution of the WMIC tool
with the "/Format" parameter, which allowed the download and execution
of malicious JavaScript code. The JavaScript code, in turn, downloads
payloads by abusing the Bitsadmin tool. This section will discuss using some native Windows tools for download and upload operations. Depending on the file size we want to transfer, we can use different
methods that do not require network communication. If we have access to a
terminal, we can encode a file to a base64 string, copy its contents
from the terminal and perform the reverse operation, decoding the file
in the original content. Let's see how we can do this with PowerShell. An essential step in using this method is to ensure the file you encode and decode is correct. We can use md5sum,
a program that calculates and verifies 128-bit MD5 checksums. The MD5
hash functions as a compact digital fingerprint of a file, meaning a
file should have the same MD5 hash everywhere.
0 Comments
Thanks For your comment