Difference between revisions of "Netcat"

From wikieduonline
Jump to navigation Jump to search
Tags: Mobile web edit, Mobile edit
 
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
Netcat is the swiss army knife of the hackers. Netcat is used for file (exploit) transfer, finding open ports & remote administration (Bind & Reverse Shells). You can manually connect to any network service like HTTP using netcat. Another utility is to listen on any udp/tcp ports on your machine for any incoming connections.  
+
Netcat is the swiss army knife of the hackers. Netcat is used for file (exploit) transfer, finding open ports & remote administration (Bind & Reverse Shells). You can manually connect to any network service like HTTP using netcat. Another utility is to listen on any [[UDP]]/[[TCP]] ports on your machine for any incoming connections.  
  
 
* Windows: <code>[[ncat]].exe</code>
 
* Windows: <code>[[ncat]].exe</code>
Line 11: Line 11:
 
* <code>echo "text to send" | nc 10.10.10.10  54</code>
 
* <code>echo "text to send" | nc 10.10.10.10  54</code>
  
* Forward port:
+
* Forward port (see also <code>[[socat]]</code>):
 
:<code>nc -l -p ORIGIN_PORT -c 'nc DESTINATION_IP DESTINATIO_PORT'</code>
 
:<code>nc -l -p ORIGIN_PORT -c 'nc DESTINATION_IP DESTINATIO_PORT'</code>
 
:<code>nc -l -p 2222 -c 'nc 10.10.10.4 8888'</code>
 
:<code>nc -l -p 2222 -c 'nc 10.10.10.4 8888'</code>
  
:<code><nc<IPaddress or FQDN> <port number></code>
+
:<code>nc <IPaddress or FQDN> <port number></code>
 +
 
 +
 
 +
[[nc]] -vnzu  5x.253.51.xxx 4501
 +
Connection to 5x.253.51.xxx 4501 port [udp/*] succeeded!
 +
-u Use UDP
 +
[[nc -v|-v]] verbose
 +
-z  specifies that nc should just scan for listening daemons, without sending any data to them
 +
 
 +
nc -zv google.com 80
 +
Connection to google.com 80 port [tcp/http] succeeded!
 +
 
 +
nc -zv google.com 443
 +
Connection to google.com 443 port [tcp/https] succeeded!
 +
 
 +
[[UDP]] (-u)
 +
nc -u XXXXX
  
 
== Related commands ==
 
== Related commands ==
 
* <code>[[iperf]]</code>
 
* <code>[[iperf]]</code>
 
* <code>[[pv]] </[[dev]]/[[zero]] | ssh REMOTE_SERVER 'cat >/dev/[[null]]'</code>
 
* <code>[[pv]] </[[dev]]/[[zero]] | ssh REMOTE_SERVER 'cat >/dev/[[null]]'</code>
 +
* <code>[[nping]]</code>
 +
* <code>[[netstat]]</code>
  
 
== See also ==
 
== See also ==
Line 25: Line 43:
 
* {{netcat}}
 
* {{netcat}}
 
* {{nmap}}
 
* {{nmap}}
*{{Security}}
 
  
 
[[Category:Linux]]
 
[[Category:Linux]]

Latest revision as of 12:45, 12 December 2023

Netcat is the swiss army knife of the hackers. Netcat is used for file (exploit) transfer, finding open ports & remote administration (Bind & Reverse Shells). You can manually connect to any network service like HTTP using netcat. Another utility is to listen on any UDP/TCP ports on your machine for any incoming connections.

  • Windows: ncat.exe
  • Linux:


nc examples[edit]

  • echo "text to send" | nc IP port
  • echo "text to send" | nc 10.10.10.10 54
  • Forward port (see also socat):
nc -l -p ORIGIN_PORT -c 'nc DESTINATION_IP DESTINATIO_PORT'
nc -l -p 2222 -c 'nc 10.10.10.4 8888'
nc <IPaddress or FQDN> <port number>


nc -vnzu  5x.253.51.xxx 4501
Connection to 5x.253.51.xxx 4501 port [udp/*] succeeded!
-u Use UDP
-v verbose
-z  specifies that nc should just scan for listening daemons, without sending any data to them
nc -zv google.com 80
Connection to google.com 80 port [tcp/http] succeeded!
nc -zv google.com 443
Connection to google.com 443 port [tcp/https] succeeded!
UDP (-u)
nc -u XXXXX

Related commands[edit]

See also[edit]

Advertising: