Post Exploitation File Transfers can be difficult on a freshly compromised machine TFTP File Transfers