In this post, we will go over various techniques that allow us to perform file transfers from our attacker machine onto a victim Linux host (download), as well as from a victim Linux host back onto our attacker machine (upload). As hackers, we constantly find the need to drop tools onto our victim or the […] The post Linux File Transfers for Hackers first appeared on Juggernaut Pentesting Blog.