![]() In some cases, adversaries may be able to leverage services that sync between a web-based and an on-premises client, such as Dropbox or OneDrive, to transfer files onto victim systems. Īdversaries may also abuse installers and package managers, such as yum or winget, to download tools to victim hosts.įiles can also be transferred using various Web Services as well as native or otherwise present tools on the victim system. On Linux and macOS systems, a variety of utilities also exist, such as curl, scp, sftp, tftp, rsync, finger, and wget. On Windows, adversaries may use various utilities to download tools, such as copy, finger, certutil, and PowerShell commands such as IEX(New-Object Net.WebClient).downloadString() and Invoke-WebRequest. ![]() Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment (i.e. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as ftp. ![]() Adversaries may transfer tools or other files from an external system into a compromised environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |