this method is used when the remote host may have firewall protections that prevent the attacker from downloading a file into the compromised host
root@oco:~$ base64 shell -w 0
f0VMRgIBAQAAAAAAAAAAAAIAPgABAAAA... <SNIP> ...lIuy9iaW4vc2gAU0iJ51JXSInmDwU
* the -w 0 disables line wrapping.
- it is useful in situations where embedding the output in a single-line script
and transmitting over network protocols that break on newlines
root@target:~$ echo f0VMRgIBAQAAAAAAAAAAAAIAPgABAAAA... <SNIP> ...lIuy9iaW4vc2gAU0iJ51JXSInmDwU | base64 -d > shell
#validate the file
root@target:~$ file shell
shell: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
root@target:~$ md5sum shell
321de1d7e7c3735838890a72c9ae7d1d shell
root@oco:~$ md5sum shell
321de1d7e7c3735838890a72c9ae7d1d shell