PDC4S:\Hacking\SEC560 - Network Penetration Testing and Ethical Hacking\Section4 - Post-Exploitation and Merciless Pivoting\4.1 Moving Files with Exploits