Johnermac
  • About me
  • Active Directory
    • PowerShell
      • Customize
      • Notes
      • ETW
      • AMSI Bypass
      • Obfuscation
    • Enumeration
      • Domain
      • GPO
      • ACL
      • Domain Trusts
      • Forest
      • Extra
      • BloodHound
      • BloodHound CE
  • Tunneling
    • Tools
      • Udp2Raw
      • Fraud Bridge
      • Chisel
      • SSF
      • Egress-Assess
      • Ligolo-ng
      • Sshutle
      • Rpivot
      • Tunna
      • reGeorg
      • Neo-reGeorg
      • PivotSuite
  • Post-Exploitation
    • Data Exfiltration
      • HTTP
        • Cancel
        • wget
        • bash
        • busybox
        • IRB
        • PHP
        • Ruby
      • ICMP
        • XXD
        • Ruby
        • Python
      • UDP
        • Netcat
      • TCP
        • Netcat
        • KSH
        • whois
        • Finger
      • HTTPS
        • Python
        • OpenSSL
  • BLOG
    • Articles
      • Pivoting for Red Teaming
Powered by GitBook
On this page
  • Basic Usage
  • How to extract files using FINGER
  1. Post-Exploitation
  2. Data Exfiltration
  3. TCP

Finger

Finger is a network protocol and a command-line tool used to gather information about users on a remote system or network.

PreviouswhoisNextHTTPS

Last updated 2 years ago

Basic Usage

finger [username@]hostname
finger john@example.com

How to extract files using FINGER

We can see in the print below that it sends through the TCP, but FINGER has its own protocol that made the query

Open a Listener - default port of FINGER is 79
Install Finger
Send the FIle
Shadow extracted
Wireshark Results