How to Move Files Around While Hacking

This video will cover several methods of moving files around on your attack machine and compromised hosts. The methods covered should be sufficient for most circumstances that require a file to either be uploaded to a compromised host or downloaded to your attack machine.