After we have compromised a machine inside a network, we need to download tools for lateral movement, local exploits to escalate privileges, etc. Knowing how to setup a file dropper is crucial.

When I was doing the OSCP 24-hour exam but also when doing the training in the labs, that was very useful as I could easily download any payload, trojan or implant from my kali machine to the target machine:

How to setup a PHP file dropper with one liner
How to set up a PHP file dropper with one liner

For a more “heavy” tool but much more powerful have a look to this one:

For more hints about post exploitation, check post exploitation intro here:

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Reply