Infographic vector created by upklyak - www.freepik.com

Often times when I participate in Capture-the-Flag (CTF) events or engage in a penetration test, I'll need to send files from one computer to another. Sometimes I might transfer from Windows to Windows, Linux to Linux, or Windows to Linux and vice versa. In many cases, I need to transfer files to and from my Windows desktop (my host) to my Linux Virtual Machine (VM). During CTFs or penetration testing, it's imperative to know a variety of methods for transferring files between different machines and operating systems.

Sometimes during a CTF or a pentesting engagement, you'll need to grab files from a victim machine back to your attacking machine. Or, you might need to send your files from your Kali Linux VM (or other flavor of Linux) to your Windows machine for more permanent storage. In this blog, I'll show several different methods for transferring files.

Transferring Files

Many people in the cybersecurity/information security world rely heavily on VMware. VMware Tools allows users to seamlessly transfer files between their host operating system and their virtual machines. But, VMware licenses can be expensive and not everyone uses it.

I use ProxMox as my virtualization solution and haven't used VMware for a few years. Unfortunately, there isn't a VMware Tools equivalent for copying/pasting or transferring files from your host to your ProxMox VMs. I've found a few creative solutions that have worked for me.

Copying and Pasting with Netcat (Windows to Linux)

Using this method requires downloading Netcat for Windows (if you're using Windows). Download and install netcat, then follow the steps below.

Let's say I have the following machines and IPs that I want to copy/paste between:

  • Windows (192.168.1.10)
  • Linux (192.168.1.20)

First, open a Command Prompt (Hold Win+R, then type "cmd"). Enter the following command to start a Netcat listener on a port (I used port 4815 in my example).

C:\> nc -lnvp 4815

Now, from your Linux VM, connect to the listener using the following command:

$ nc 192.168.1.10 4815

If you enter text in one terminal and press Enter, you'll see the text appear in the other machine's terminal. You can also copy text and paste it rather than typing it in.

Sending files with Netcat

Sending files with Netcat is very easy. The only downside to this method is that Netcat is not native to Windows.

Send the file through the Netcat listener:

C:\> nc -lnvp 4815 < path\to\file.txt

Receive the file on your Linux VM:

$ nc 192.168.1.10 4815 > file.txt

This works if you reverse the process as well and send from Linux and receive on Windows.

Sending Files with Python

You can also use Python's HTTP server to send files. For this method, only the sender needs to have Python installed. There are a ton of ways you can send files using Python; I'm only going to touch on the HTTP server method.

First, navigate to the directory (folder) that you want to expose to the receiving client. Then, start the HTTP server:

$ python3 -m http.server
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...

If you're a caveman and still using the deprecated Python 2.7, use HTTPServer instead of http.server.

On the Windows host, open a browser and navigate to the sender's IP address on port 8000: http://192.168.1.20:8000. You'll see a list of contents; download the file you want to receive.

Sending Files with Secure Copy (SCP)

Assuming both systems have Secure Shell (SSH) installed, you can use SCP to copy a file from one machine to another. This is possible on Windows if you have installed and enabled the Linux subsystem for Windows.

As is the case with the previous methods, open a Command Prompt or terminal and run scp. The command syntax looks like this when using a password:

scp <source file> <user>@<IP or domain>:<path/to/file>

Push a file to a remote host using this command:

C:\Users\syyntax>scp file.txt syyntax@192.168.1.20:/home/syyntax/Documents

Pull a file from a remote host using this command:

C:\Users\syyntax>scp syyntax@192.168.1.20:/home/syyntax/Documents/file.txt file.txt

Sending Images between Windows and Linux

Now, let's say you're in a situation where you need to send a file from Windows to Linux, but the Windows machine doesn't have netcat, scp, or python installed. This commonly happens in pentesting engagements when you successfully break into a Windows machine and need to pull files (without an easy method like meterpreter). This may not be the most efficient method, but it works.

Use Certutil to get Hex Values

From the Windows machine, use the certutil tool to grab the hexadecimal values of the file. In my example, I want to pull sensitive.pdf from my victim's machine, but all I have is a shell and no means of transferring the file. I use certutil to output the file's hexadecimal values to sensitive.txt. Then, I use type to see the data.

C:\Users\victim>certutil -encodehex -UnicodeText sensitive.pdf sensitive.txt
Input Length = 48442
Output Length = 224066
CertUtil: -encodehex command completed successfully.

Read the Hex File Contents

Read the data with type:

C:\Users\victim>type sensitive.txt

0000    25 50 44 46 2d 31 2e 36  0d 25 e2 e3 cf d3 0d 0a   %PDF-1.6.%......
0010    31 30 20 30 20 6f 62 6a  0d 3c 3c 2f 4c 69 6e 65   10 0 obj.<</Line
0020    61 72 69 7a 65 64 20 31  2f 4c 20 34 38 34 34 32   arized 1/L 48442
0030    2f 4f 20 31 32 2f 45 20  34 34 31 32 35 2f 4e 20   /O 12/E 44125/N
0040    31 2f 54 20 34 38 31 34  30 2f 48 20 5b 20 35 31   1/T 48140/H [ 51
0050    36 20 31 39 34 5d 3e 3e  0d 65 6e 64 6f 62 6a 0d   6 194]>>.endobj.
0060    20 20 20 20 20 20 20 20  20 20 20 20 20 20 20 20
0070    20 20 0d 0a 33 37 20 30  20 6f 62 6a 0d 3c 3c 2f     ..37 0 obj.<</
...

The output might be very long, so you may need to increase your terminal's buffer size if possible. From here, I'll highlight the contents of sensitive.txt and copy.

Plug the Content into Cyber Chef

If you've read many of my blogs here, you know I'm a big fan of Cyber Chef. Navigate to https://gchq.github.io/CyberChef/ and use the From Hexdump recipe. Paste the contents of the sensitive.txt file into the Input field on the right-hand pane.

In the Output field, click on the Save icon and save the file to your machine as a PDF (for example, I saved it as sensitive-doc.pdf.

Open the PDF and you'll see the contents of the file.

You can use this method with almost any file!

Conclusion

These are just a few examples of the many ways in which you can transfer files or copy and paste text from either two remote operating systems or between your host and a VM. If you have any other methods that you use, let us know at info@cyberhacktics.com!