This video will cover several methods of moving files around on your attack machine and compromised hosts. The methods covered should be sufficient for most circumstances that require a file to either be uploaded to a compromised host or downloaded to your attack machine.
Posted inEthical Hacking Hacking Linux Networking Offsec Security Tutorial