File Transfer
Once the system is compromised, very often the attacker needs to transfer some tool to the victim's system or download some file. Uploaded files are usually tools for further privilege escalation, credential harvesting or lateral movement. Files downloaded are mostly logs and output from tools.
From attacker to victim (upload)
Simple HTTP server
Attacker:
Victim:
IMPORTANT: It might be worth to check file integrity after download using MD5 hash:
Get-FileHash $file -Algorithm MD5
Bidirectional
Simple SMB server
Attacker:
Victim:
Existing SMB share
If there is some SMB share running on the victim's machine and you have access to it from both sides (attacker and victim), then you can use it to conveniently transfer files both ways.
Evil-WinRM
The evil-winrm
tool is able to perform file transfer out of the box if only session is established.
Attacker (Evil-WinRM CLI):
C2 Frameworks
Probably all C2 frameworks have built-in file transfer feature implemented. Take a look at the documentation of the C2 framework you are using.