β˜„οΈ
Certified Ethical Hacker
search
Ctrlk
  • πŸ‘‰Certified Ethical Hacker Cheatsheet
  • 🐧General Settings
    • πŸ“¦APT Package Manager
    • πŸ€–Cron
    • 🦊Firefox Extensions
  • ✍️Research & Report
    • πŸ’ Obsidian
    • 🎒Notion
    • 🐼Pwndocs
  • πŸ”ŽInformation Gathering
    • πŸ“›NSLookup // Dig // Whois
    • πŸ“œNmap
    • πŸ–₯️DNS Enumeration
  • πŸ”¬Vulnerability Assessment
    • 🌐Web Assessmentchevron-right
    • πŸ•ΈοΈNetwork Assessmentchevron-right
  • βš”οΈExploitation
    • πŸ”΄Metasploit
    • 🐍MSFVenom
    • πŸ‘οΈSearchsploit
    • 🐚Revshells
    • 🐱Netcatchevron-right
    • πŸ’ͺBrute Force
    • πŸ”’Wi-FI
  • ⚜️Post Exploitation
    • β›ΊPersistence
    • πŸ“File Transferchevron-right
      • Netcat
      • SMB
      • Python
      • Updog
      • Linpeas
    • πŸ•³οΈTunnelling
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚜️Post Exploitationchevron-right
  2. πŸ“File Transfer

SMB

LogoPWK Notes: Post-Exploitation Windows File Transfers with SMB0xdf hacks stuffchevron-right
PreviousNetcatchevron-leftNextPythonchevron-right

Last updated 2 years ago