WINDOWS XP - CREATING FILES REMOTELY
- Layout of this exercise:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh93sU6qGtclJ2WO-QSJXcDq-nievzpnbKes60RG0nhLlSvn048BLIniuzfVgEKR_BmN5S9HsoFxbqZiXzsRPfaRk21X8O4xkIAlo1GX4OEjWChL30XMI1Vqp36ZDeEt5L2h5TQdJssC0II/s1600/XP_LAYOUT.jpg)
- Another interesting exercise is to create files remotely. Let's see what is the content of C:\ at the victim, before the attack:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHE6M-K3DLP06MijjxWrGT6k2MrskqvW6kA3iCs_GdJPq1TLc-pHo6oFsH5nj7muWR3Lk85Rh5RVVSn-wNWcKQqL9PIiUyTc94TO4-RUEFgcLCoc3BA-6YEGP37-ublqQ495Q8FcxKdPpa/s1600/screenshot.16.jpg)
- Now, from the attacker's console, a text file is created remotely on C:\. Let's call it TestFile, also adding some content::
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR0tYwv-TwFgnZyUmJ70BngQ0ikAizvMy4E3dmp2i4xoYVrfrLXOe4dX2S1ifgbZ16Ynvda40f1Hq94enOAuXbcqpyxt8uuA7SZfxqlOU3oHh6lTduZfWCdw_f9LqgIXGIInnaEKDgZFoV/s1600/screenshot.17.jpg)
- Automatically,
the new file is created on the victim's machine:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_QWrEBq_6yPd4O4wsKIOZo6vaUixVdtPr0Qnsb9UDOD8jCTq3dXTahE50U6Ph_Q6bN31IbjJdi5wTbqXpRFRN45j6EdThOfnB2Af65rZgHYU6Ew5YNMz6rNxlM17R8ttgm8FFJk3F3LIt/s1600/screenshot.18.jpg)
- The
content of the file:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBn1-hCpXA7VZdllcEhcfSCgvt2QEqV9_hx-YAssjjD5X4Ol7jHzpGjz0z3LoSGngbzwDZ2_pu0QeGNT_an88tSH7mo4lv1u2MauWj5uwnr2fQ3MoYUXR1XssRW3mTjSoMDfj_McHuu5Gm/s1600/screenshot.19.jpg)
- Finally, the file can be removed remotely:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfiHBIOXZLipwXVYWQ2zBCdWWRlTypm4iULClqkh5I10GJ6zQVkV8shWLOIQYxArb9uyGF7zoF8xji56WTQ69SGzWQGiBwPqg1brmuWJonXCvKJpvwuHjchD7W01B9295XQc1aFKLbGlHm/s400/screenshot.20.jpg)