Here are some tricks and tips to transfer files from the attacker's machine to target machines, where the target can be either Windows or Linux.
File Hash